background preloader

Security

Facebook Twitter

Cracking TrueCrypt / non-system, container | 0x31. In this case study we will try to decrypt the three variants of TureCrypt that you will encounter in the wild. TrueCrypt containers, fully trueCrypted non-system partitions/drives (an external USB HDD for example) as well as trueCrypted system drives with a boot loader. For this purpose we will use the currently (end of 2014) fastest available program oclHashcat, more exact it’s Nvidia compatible version cudaHashcat. A big thank you to the folks who develop this software. If you like Cryptography in general then I recommend you my article on cracking RSA, iuncluding the mathematical background. This is a ‘work in progress’ article. Just some quick basics about drives/partitions and some terms. For demonstration i crafted a formated USB stick with a fully encrypted partition on it by use of the respective “non-system partition/drive” option.

My fully encrypted test disk is 8GB large. Insert USB and check devices. Check content of our 512 byte file just for funnzies. This looks good. Internet-Law. Krebs on Security. E Hacking News [ EHN ] - The Latest IT Security News | Hacker News. Infosecurity - the online magazine dedicated to the strategy and technique of information security. Untitled. Spam Info | News & Warnungen zum Thema Anti-Spam, Viren und Trojaner.

Blogs