I start to search in internet for some tools than can help me to bruteforce the file but I couldn't find any. I remember one page propose one solution: Create an script and launch the truecrypt aplication with some command line options and test if was possible to open it. I tried to do it but it was really slow so I start to search for another options until I found a way to use truecrypt as a self-bruteforce: Instead of launch truecrypt everytime with a different password I made a script in python with the winappdbg python module that acts as a loader and change/test the password in the memory space of truecrypt itself.
Requirementes and notes:
- python (.x should also work)
- Use the truecrypt application provided in the attached file or against a Keepass version a
- It only works agains volumes without keyfiles
Of course, to made this script possible first I debug keepass and after a while I found how to change the password in memory and force the program to test it again.
|TrueCrypt-SB v0.1.rar||[TrueCrypt Self-Bruteforce v]||Kb|