Daily hack
Truecrypt GPU partial password
recovery By George Lagoda
Feb 15, 2014
/wh0x41mi
George Lagoda
 Security expert
 Pentester
 Interests: [deep|web]penetrations,
revers, forensics,
Work at . . .
Again about recovery
Maybe again about Anna 
What I had?
• Partialy lost TC passwd
• 4-5 symbols lost or we have something like:
[Y|y]a[L|l]ublu[S|s]vou[K|k]isku
So we either do not remember 1-2-3-4-5
symbols
Or Don’t remember symbols’ case
Tools for Linux
TrueCrack
Written for Linux
Optimized for CUDA (NVDIA dependence )
Supports most of TC hash types and encryption
methods
But what is AMD or WINDOWS?
oclHashCat, the almighty 
Supports both CUDA and OpenCL, lot of
modules, hard to understand
>cudaHashcat64 –help
621Y = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160
622Y = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512
623Y = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool
624Y = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 boot-mode
How this all work?
Offset(bytes) Size Description
0 64 Salt
64 4 ASCII string “TRUE” (encrypted)
Usually we know hash type, we have salt and encrypted string.
HACK Time?
Some more options
So lets give it a hack
cudaHashcat64.exe -m 6211 C:Tempanna_secret.tc -a 3 -1 ?l?u?d ?1?1wer?1Y -o
C:Tempanna.txt
Results 
Daily hack : Truecrypt GPU partial password recovery
The end.

5. [Daily hack] Truecrypt

  • 1.
    Daily hack Truecrypt GPUpartial password recovery By George Lagoda Feb 15, 2014
  • 2.
    /wh0x41mi George Lagoda  Securityexpert  Pentester  Interests: [deep|web]penetrations, revers, forensics, Work at . . .
  • 3.
  • 4.
  • 5.
    What I had? •Partialy lost TC passwd • 4-5 symbols lost or we have something like: [Y|y]a[L|l]ublu[S|s]vou[K|k]isku So we either do not remember 1-2-3-4-5 symbols Or Don’t remember symbols’ case
  • 6.
    Tools for Linux TrueCrack Writtenfor Linux Optimized for CUDA (NVDIA dependence ) Supports most of TC hash types and encryption methods But what is AMD or WINDOWS?
  • 7.
    oclHashCat, the almighty Supports both CUDA and OpenCL, lot of modules, hard to understand >cudaHashcat64 –help 621Y = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 622Y = TrueCrypt 5.0+ PBKDF2-HMAC-SHA512 623Y = TrueCrypt 5.0+ PBKDF2-HMAC-Whirlpool 624Y = TrueCrypt 5.0+ PBKDF2-HMAC-RipeMD160 boot-mode
  • 8.
    How this allwork? Offset(bytes) Size Description 0 64 Salt 64 4 ASCII string “TRUE” (encrypted) Usually we know hash type, we have salt and encrypted string. HACK Time?
  • 9.
  • 10.
    So lets giveit a hack cudaHashcat64.exe -m 6211 C:Tempanna_secret.tc -a 3 -1 ?l?u?d ?1?1wer?1Y -o C:Tempanna.txt
  • 11.
  • 12.
    Daily hack :Truecrypt GPU partial password recovery The end.