Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 May 2015 20:55:01 +0200
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Recovering truecrypt pass-phrase with known keyfile

On 2015-05-21 20:30, Rich Rumble wrote:
> On Thu, May 21, 2015 at 1:36 PM, magnum <john.magnum@...hmail.com> wrote:
>> On 2015-05-21 19:27, Dhiru Kholia wrote:
>>>
>>> On Thu, May 21, 2015 at 5:28 PM, Marek Wrzosek <marek.wrzosek@...il.com>
>>> wrote:
>>>>
>>>> Lately I've been reading TrueCrypt User Guide and I'm curious. Is it
>>>> possible to recover pass-phrase of truecrypt volume with known keyfile
>>>> using JtR? If not, are there any plans of adding this to john in the
>>>> future?
>>>
>>>
>>> Seems to be simple enough,
>>>
>>> https://github.com/bwalex/tc-play/blob/master/crypto.c#L201
>>
>>
>> I see nothing there. Isn't that part of the code using already decrypted
>> keyfile data?
> If I recall from TC's doc's it read the first 1024 bytes of the
> keyfile and used that as the second part of the password.
> <quote>
> Any kind of file (for example, .txt, .exe, mp3, .avi) may be used as a
> TrueCrypt keyfile. However,
> we recommend that you prefer compressed files, such as .mp3, .jpg,
> .zip, etc. Note that TrueCrypt
> never modifies the keyfile contents. Therefore, it is possible to use,
> for example, five files in your
> large mp3 collection as TrueCrypt keyfiles (and inspection of the
> files will not reveal that they are
> used as keyfiles).

I see. So we'd just add ability to use a keyfile in addition to the 
cracking we currently have. I thought a keyfile was something like 
passphrase->KDF->key but that was not the case.

magnum


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.