it is only showing my first drive. I have tried the drive both as USB3 and SATA neither one shows up when I df -h
I'm just guessing.
sudo fdisk -l
sudo gnome-disks
sudo gparted
We're still cracking a TrueCrypt password, right? I wouldn't fool around with Cuda, or any kind of gpu cracking. Being proprietary software, it won't be as stable or supported as the libre drivers. You said you have the words, or most of the words used in the password, and just have to arrange them correctly. The cpu should be more than enough to crack that in a timely manner.
As a quickie reply(I'd have to study up to remember the particulars of TrueCrack)... I suggested the libre gfx driver cause it usually Just Works™, and I didn't think gpu cracking was necessary for the op. IOW, use the gfx to just see stuff on the screen, and use the cpu to crack the password. If you kinda know what the password is, the cpu should be sufficient. Setup a decent dictionary to narrow down the choices, and set the computer loose on the drive.
You would use gpu cracking when you have no idea what the pass is. A gpu with the correct drivers can make light(ish) work of most user passwords; much faster than cpu cracking. Problem is the fancier proprietary gfx drivers can be tricky to setup in gnu/linux. Since it sounds like you pretty much know the pass, the slower, but easier to setup cpu crack would be the way to go.
I wouldn't use a virtual machine. It may work, but it'll use resources better spent on cracking, and it adds a layer of abstraction where things could go wrong. Bootable cd/usb would be better I think.
Check the README here...
https://github.com/lvaccaro/truecrack
Take note of the alphabet attack. Shortly, what you want to do is create a file with all the possible letters/characters in the password. That narrows down the scope of attack, and will speed up results. I'm pretty sure it's case sensitive, as gnu/linux is case sensitive. a, A, and ä are all different characters, and you'll want to include them in your file if you think you may have used them. Likewise for special characters; $, *, ", ...
I wouldn't use a virtual machine. It may work, but it'll use resources better spent on cracking, and it adds a layer of abstraction where things could go wrong. Bootable cd/usb would be better I think.
Check the README here...
https://github.com/lvaccaro/truecrack
Take note of the alphabet attack. Shortly, what you want to do is create a file with all the possible letters/characters in the password. That narrows down the scope of attack, and will speed up results. I'm pretty sure it's case sensitive, as gnu/linux is case sensitive. a, A, and ä are all different characters, and you'll want to include them in your file if you think you may have used them. Likewise for special characters; $, *, ", ...