getting Truecrack to work in Kali Linux, I need to know how to point TC to my 2nd HD

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
thanks
lshw: command not found
is there an alternate way of getting the drive path?
 
Last edited:

BirdDad

Golden Member
Nov 25, 2004
1,131
0
71
it is only showing my first drive. I have tried the drive both as USB3 and SATA neither one shows up when I df -h
EDIT
it keeps wanting a file not a drive, when I tell it to -t </sdb> (that's the only way I know how to point to the hard drive).
it says error in newline so I tried it without the / and tried it both ways in and without <>
Here is what I am doing : -t </sdb/> -k <whirlpool> -e <serpent> -e <twofish> -w <pw.txt>

Thanks
 
Last edited:

lxskllr

No Lifer
Nov 30, 2004
59,062
9,455
126
You have problems with your syntax, but you need to find your drive first. How did you determine it was sdb?
 

Essence_of_War

Platinum Member
Feb 21, 2013
2,650
4
81
it is only showing my first drive. I have tried the drive both as USB3 and SATA neither one shows up when I df -h

I'm just guessing.

It sounds like your drive isn't even mounted, so first you'll need to find the block device and then assign it a mount point. To figure out the label of the block device, you could try one of these at the terminal:

Code:
sudo fdisk -l
which will give you a list of your physical devices and partitions with their device labels.

You could also try:
Code:
sudo gnome-disks
OR
Code:
sudo gparted
one of which should launch Kali Linux's disk utility. Or you could hunt around for it under Applications -> System Tools and look for it there. Are you able to locate the device label (/dev/sdX) by doing this?
 

joshxt

Junior Member
Aug 17, 2017
4
0
6
We're still cracking a TrueCrypt password, right? I wouldn't fool around with Cuda, or any kind of gpu cracking. Being proprietary software, it won't be as stable or supported as the libre drivers. You said you have the words, or most of the words used in the password, and just have to arrange them correctly. The cpu should be more than enough to crack that in a timely manner.

I know this is the most necromantic thing I could possibly do, but I created this account in order to reach out as I'm in a similar situation as OP.

I used TrueCrypt to encrypt a USB, and while the password itself is simple, I added 2-3 symbols and can't seem to remember which ones. I was planning to use TrueCrack (installed Ubuntu via VirtualBox), but your comment makes it sound like there's a much simpler process. Would you care to elaborate on the "libre drivers" or would you mind if I messaged you directly?
 

lxskllr

No Lifer
Nov 30, 2004
59,062
9,455
126
As a quickie reply(I'd have to study up to remember the particulars of TrueCrack)... I suggested the libre gfx driver cause it usually Just Works™, and I didn't think gpu cracking was necessary for the op. IOW, use the gfx to just see stuff on the screen, and use the cpu to crack the password. If you kinda know what the password is, the cpu should be sufficient. Setup a decent dictionary to narrow down the choices, and set the computer loose on the drive.

You would use gpu cracking when you have no idea what the pass is. A gpu with the correct drivers can make light(ish) work of most user passwords; much faster than cpu cracking. Problem is the fancier proprietary gfx drivers can be tricky to setup in gnu/linux. Since it sounds like you pretty much know the pass, the slower, but easier to setup cpu crack would be the way to go.
 

joshxt

Junior Member
Aug 17, 2017
4
0
6
As a quickie reply(I'd have to study up to remember the particulars of TrueCrack)... I suggested the libre gfx driver cause it usually Just Works™, and I didn't think gpu cracking was necessary for the op. IOW, use the gfx to just see stuff on the screen, and use the cpu to crack the password. If you kinda know what the password is, the cpu should be sufficient. Setup a decent dictionary to narrow down the choices, and set the computer loose on the drive.

You would use gpu cracking when you have no idea what the pass is. A gpu with the correct drivers can make light(ish) work of most user passwords; much faster than cpu cracking. Problem is the fancier proprietary gfx drivers can be tricky to setup in gnu/linux. Since it sounds like you pretty much know the pass, the slower, but easier to setup cpu crack would be the way to go.

I appreciate you taking the time to reply. I'm guessing using the CPU is best in my situation as I'm using Ubuntu in a virtual machine. Super new to Linux, still YouTubing the commands and what not.

I've stumbled upon dictionary hacking before, and I'm thinking I can google how to set up a dictionary without too much trouble. The part that gets me is the "setting the computer loose" on the drive. I'm not sure how to actually execute that. Will it just be via the terminal in Linux?
 

lxskllr

No Lifer
Nov 30, 2004
59,062
9,455
126
I wouldn't use a virtual machine. It may work, but it'll use resources better spent on cracking, and it adds a layer of abstraction where things could go wrong. Bootable cd/usb would be better I think.

Check the README here...

https://github.com/lvaccaro/truecrack

Take note of the alphabet attack. Shortly, what you want to do is create a file with all the possible letters/characters in the password. That narrows down the scope of attack, and will speed up results. I'm pretty sure it's case sensitive, as gnu/linux is case sensitive. a, A, and ä are all different characters, and you'll want to include them in your file if you think you may have used them. Likewise for special characters; $, *, ", ...
 

joshxt

Junior Member
Aug 17, 2017
4
0
6
I wouldn't use a virtual machine. It may work, but it'll use resources better spent on cracking, and it adds a layer of abstraction where things could go wrong. Bootable cd/usb would be better I think.

Check the README here...

https://github.com/lvaccaro/truecrack

Take note of the alphabet attack. Shortly, what you want to do is create a file with all the possible letters/characters in the password. That narrows down the scope of attack, and will speed up results. I'm pretty sure it's case sensitive, as gnu/linux is case sensitive. a, A, and ä are all different characters, and you'll want to include them in your file if you think you may have used them. Likewise for special characters; $, *, ", ...

I'm with you thus far.

I'm currently creating the password list of the things I think it could be including special characters and what not.

Now my question is, once I finish this list and I'm ready to test it, how do I get the software to target my USB? I'm not too familiar with Linux, but on Windows it shows up as Local Disk (E:).
 

joshxt

Junior Member
Aug 17, 2017
4
0
6
I wouldn't use a virtual machine. It may work, but it'll use resources better spent on cracking, and it adds a layer of abstraction where things could go wrong. Bootable cd/usb would be better I think.

Check the README here...

https://github.com/lvaccaro/truecrack

Take note of the alphabet attack. Shortly, what you want to do is create a file with all the possible letters/characters in the password. That narrows down the scope of attack, and will speed up results. I'm pretty sure it's case sensitive, as gnu/linux is case sensitive. a, A, and ä are all different characters, and you'll want to include them in your file if you think you may have used them. Likewise for special characters; $, *, ", ...

If I understand correctly, I need to mount the USB in Ubuntu. If that's correct, when I attempt to do that using

"mkdir ~/USBCrack
sudo mount /dev/sdb1 ~/USBCrack"

it then tells me I need to specify the filesystem type. Though I'm not sure what that filesystem type is considering the USB volume was created on TrueCrypt using Windows. From some Googling it looks like the most common options are NTFS and FAT32. Linux doesn't seem to recognize these filesystems.

Also, if I'm way off here feel free to internet slap me and point me in the right direction. Lol
 

lxskllr

No Lifer
Nov 30, 2004
59,062
9,455
126
The command
Code:
 fdisk -l
should give you the file system for that drive.

edit:
Use sudo for the command if you aren't root, but I believe kali logs you in as root by default.
# is the root prompt in the terminal
$ is an unprivileged user