DiskCryptor forum

DiskCryptor => General => Topic started by: xelvet on November 03, 2016, 07:13:39 pm

Title: BruteForcing DC with HashCat
Post by: xelvet on November 03, 2016, 07:13:39 pm
How to extract the necessary .bin data and
feed it into hashCat, for cracking, please advise @ntldr.

Выкурил здесь железо кот террористы узурпировавшие эту власть
отобрали у меня 4.5 года назад. Рыскали по всем моим жёстким aka
digital forensic, poor devils. Now i'm doing my forensic on their forensic.

Now it seems one of my hdds is encrypted with DiskCryptor.
Naturally i can't remember( the passphrase, it's been quite awhile.

Also, https://letsencrypt.org/
Title: Re: BruteForcing DC with HashCat
Post by: Anfinuo on November 04, 2016, 12:00:55 pm
...please advise @ntldr.
:D
Title: Re: BruteForcing DC with HashCat
Post by: xelvet on November 05, 2016, 08:24:36 pm
:D
wtf? it's essential.  pen testing. how else
on earth can you be sure of something
if you've never pentested it yourself?