I have a 4tb hard drive with a 300gb encrypted partition for porn...

I have a 4tb hard drive with a 300gb encrypted partition for porn, and guess what: I forgot the specifics of the password.

I say specifics because I still know what the password is, generally: "theinternetisREALLY,REALLY,REALLYgreat"

The problem is, I've forgotten:

-How many 'REALLY's there are: "theinternetisREALLY,REALLY,REALLYgreat" vs theinternetisREALLY,REALLY,REALLY,REALLY,REALLY,REALLYgreat"
-Whether there are commas between the "reallys": "theinternetisREALLYREALLYREALLYgreat" vs "theinternetisREALLY,REALLY,REALLYgreat"
-Whether there was a comma between the last really and the great.
-Whether I used veracrypt or truecrypt.

I know for sure that:

-There was more than one really, but less than eight.
-The reallys were in all caps.


I wouldn't care so much about porn, but I had saved a bunch of tumblrs that have now been deleted, and some now dead torrents.

How can I set up a system to brute-force this, Holla Forums? If the system can make one guess every two minutes, It would only take about 6-7 months to go through every possible password, right?

Other urls found in this thread:

github.com/NorthernSec/VeraCracker
law.cornell.edu/uscode/text/18/2256
twitter.com/NSFWRedditImage

nice try, fbi.

we're reaching levels of nope that shouldn't even be possible.

By writing a fucking script you stupid tard. Fuck off and die somewhere. Jesus.

Some people download those long 1 hour+ videos that are in HD quality.

This is one for StackOverflow.

Not that simple, starfox:

-It would have to interface with both truecrypt and veracrypt's command line interfaces.
-It would have to run on a dedicated PC so that each try is as fast as possible.
-The PC needs a UPS, in case of power outages.

Because the partition is so large, to even try a Veracrypt password takes 2-5 minutes. I need a way to copy the encrypted partition off of the hard drive, and load it into a high-speed ssd on the dedicated machine.


Why?


They would delete this for being "possibly malicious" even if I said it was just a normal hard drive.

300gb is not large. The size of the partition should not effect how long it takes to try a password.

I just got it out and hooked it up, It's actually 469GB.

I tried the password "theinternetisREALLYREALLYREALLYREALLYREALLYgreat", it took 49 seconds. Better than I thought, but still way, way too slow to try by hand. What's the bottleneck here?

No idea.
What key derivation function does it use and with how many iterations?

No idea. Sorry.

Use a software called Truecrack for the brute forcing, and pipe a password generator called CUPS.py and specify your password you think it is. If you have comas in the mix you'll have to do some bash work.

Cool, cool. And for Veracrypt?

You can use C# to access Microsoft APIs and directly interact with the mouse. Than force the mouse to click on the relative position of the text box and allow the program to do the rest.

Or, you know, highlight the textbox before starting the program.

"You can use C# to access Microsoft APIs"


Besides, that would be too slow: The GUI takes 40+ seconds for one try.

You're already using Windows, faggot. No point in getting all "open source is best xDDDD" autistic about it.

As far as speed you'll just have to set it and do something else. Or you could have created backups like a true Holla Forumsnition and not a fucking pleb.

Um.... No I'm not? I haven't used windows in over a year.

Must have been thinking of a different thread. That's my bad. Your bad is being fucking retarded and using Veracrypt to boot. Repent or wipe your drive, faggot.

Bullshit, there has to be a way to bruteforce it. Even if it takes a year, or longer. I want my tumblrs back.

300gb is nothing, some autistic data hoarders have terabytes and terabytes of porn

github.com/NorthernSec/VeraCracker

Does not support GPU for cracking, but should do VeraCrypt.

So, there are 24 different possible passwords
There is also no limit to how often you may enter a wrong password
Where the fuck is the problem? Just enter them one by one, or semi-automate it with xdotool or whatever
Thereafter, write down your goddamn passwords and store the paper at a secure place so shit like this doesn't happen again
And finally, kill yourself for being an underage faggot who has to hide his porn from mommy

the keylogger is (usually) active unless you're using old server editions (like 2008). look for traces in your onedrive by logging in the LEA cpanel section.

why onedrive? all the logged keystrokes are stored locally in your %homepath% but after a certain trigger they are sent over the UDP network securely via SOAP. Your local copy is wiped afterwards. They are exported as bin files but converted back to readable XML once sent to m$ servers to just "werk"

first to do is input the email and password (assuming your PC is registered to microsoft)

if you remember the last date you successfully unlocked that drive this will make the job faster. select browse and use the calendar picker at the right side. you need LEA cpanel user login. you might even see mini thumbnail screenshots and other stuff.

tip: in case you see a redflag on your account you need to remove it tbh because it means you've had CP. to lower the 'redflag' delete the parts where they're detected (explorer application and photos/videos runtime apps hash the files and photodna the thumbs) don't forget to rebuld the metadata to remove that redflag icon by clicking the refresh icon at the top.

no you must have their outlook account email/password to do that.
work for the LEA i guess. there are seminars and tools, I managed to aquire a few but they're outdated. if you know someone who works for LEA cyber division you can ask them for help.

If you have at least monkey-level coding skills then you'd go ahead and write the code which would generate and check all possible passwords.
But since you created this thread, brobably you don't have the skills, therefore prepare to live without your porn?

Or you know one of the hundred different GUI scripting programs which are designed to do this

rip porn

Where the hell are you getting that? The possibilities number in the hundreds, at the minimum.


Dafq?

Not sure how I could ha been more clear, but I had:

- Now deleted tumblrs.
- Now dead torrents.
- A few long-lost reddit girls
- Like 2 years of 4chan Holla Forums, /d/, and /hc/ threads.
- Probably tons of stuff I can't remember.

I'm not giving all that up.

You don't know which program you used to create it?

Obviously it's not your file then. Even so, why would you need the help of a program to decrypt it? Just use another one.

You're autistic.

Just bust out a pen and paper and write down the permutations of your password. You know there's more than one REALLY and less than 8 so that's only 6 combinations.

Double that for a column of comma-delimited REALLYs and you'll be done in 6*2*40 seconds + the time to set up the table and type em in.

...

You can keep the data saved and wait for quantum computers. Those things will crack nowadays encyption in a blink of an eye.

Don't give a shit. I want my tumblrs back.

Quantum computers will break currently used asymmetric encryption like RSA, truecrypt/veracrypt uses symmetric encryption.

Why the fuck do you need a script there are only, what, a couple dozen total passwords.


Just sit down and try them all. Shit's like an hour, top.

just store the last password and proceed from there

generate all permutations and then script a rubberducky to enter them after a suitable timeout. this way you circumvent truecrypt, veracrypt and all their shitty apis.

Stop hoarding so much CP, and you can just use a regular hidden folder. Also,
Congratulations, you're retarded.
Yup, retard confirmed.
Wether you're FBI/NSA, or a legitimate retard, you deserve this mess, and nobody here should help you. Now go back to reddit where you belong.

/thread

So who did you steal the hard drive from, OP?

the complete candydoll collection is like 500 gigs, and that's just one studio. 300 gigs is not much at all.

OP confirmed to be, or stole a hard drive from John Podesta

seriously?

Therefore:
no commas:
theinternetisREALLYREALLYgreattheinternetisREALLYREALLYREALLYgreattheinternetisREALLYREALLYREALLYREALLYgreattheinternetisREALLYREALLYREALLYREALLYREALLYgreattheinternetisREALLYREALLYREALLYREALLYREALLYREALLYgreattheinternetisREALLYREALLYREALLYREALLYREALLYREALLYREALLYgreat
commas between the "REALLY"s:
theinternetisREALLY,REALLYgreattheinternetisREALLY,REALLY,REALLYgreattheinternetisREALLY,REALLY,REALLY,REALLYgreattheinternetisREALLY,REALLY,REALLY,REALLY,REALLYgreattheinternetisREALLY,REALLY,REALLY,REALLY,REALLY,REALLYgreattheinternetisREALLY,REALLY,REALLY,REALLY,REALLY,REALLY,REALLYgreat
no commas between the "REALLY"s, but between the last "REALLY" and "great"
theinternetisREALLYREALLY,greattheinternetisREALLYREALLYREALLY,greattheinternetisREALLYREALLYREALLYREALLY,greattheinternetisREALLYREALLYREALLYREALLYREALLY,greattheinternetisREALLYREALLYREALLYREALLYREALLYREALLY,greattheinternetisREALLYREALLYREALLYREALLYREALLYREALLYREALLY,great
commas between the "REALLY"s and between the last "REALLY" and great
theinternetisREALLY,REALLY,greattheinternetisREALLY,REALLY,REALLY,greattheinternetisREALLY,REALLY,REALLY,REALLY,greattheinternetisREALLY,REALLY,REALLY,REALLY,REALLY,greattheinternetisREALLY,REALLY,REALLY,REALLY,REALLY,REALLY,greattheinternetisREALLY,REALLY,REALLY,REALLY,REALLY,REALLY,REALLY,great
oh wow, exactly 24 possible passwords based on what OP said; so a total of 48 tests (24 for truecrypt and another 24 for veracypt)

Test

We are talking about wintard user. Best to make it as easy as possible for their limited brain capacity.

I know the Win APIs are directly accessible by any scripting language you just have to know how to get there

this is horse shit

That's too bad. I have a couple truecrypt files containers that I was kinda hoping to someday crack. (they're my files btw, just forgot the passwords)

Nice. So with a simple script, OP should be able to crack it in less than 40 minutes.

49s per trial x 48 trials =2352s =39.2min

You are a fucking retard, Veracrypt containers uses a header you dumb motherfucker so it won't go through the entire 300GB just a few KB's, you can write a script in python easy enough and you can do it with just cryptsetup.

KYS

maybe it's time to stop the fapping and find a gf?

Shit, OP.
You have all the possible passwords. It's only 24. Just sit down and try every one by hand if you have to. It shouldn't take more than an hour.

but i have aids

Just keep guessing you fagit

you should try the bug chasing community then

try going into your command line and type in
"format c:" and when it asks if you are sure, say yes.

Or writing it down on paper and hiding it under literally anything if you seriously can't remember your master password.

If you have that much, it's probably illegal. If it isn't, then you probably have nobody in your life who'd even care to look. At least if it was CP at least one agent would care about someone as fucking stupid as you.

is it really hard to remember an encryption password? i've memorized 160-bit hashes when back i needed to and that wasn't even something critical like a password. yall niggaz not taking ur shit seriously is why we're going to get full NSA up our ass soon

Holy shit I only have 300MB of porn, how much of it is full?

This isn't the 50s. Porn is cheap and readily available. Start over your collection and don't forget your password this time.

op is a gnufag

Next time use a password manager

Winapi is still much harder than using AHK or whatever
you're really making it harder by insisting he use winapi and a "proper" programming language

Well played. /thread

The relevant question is how do you fit your porn collection in a measly 300GB partition or on a single HDD, for that matter. Are you 11 and just started building it or what?

No one cares about your multiple HDDs of porn, faggot.

...

How did you know it was gay porn?

Heh.

...

All you pedos are going to be among the first to hang on the day of the rope.

is this Holla Forums's version of the "Year of the Linux Desktop"?

I'm stealing that line and using it in reverse on the next Linux shilling Holla Forums thread

It wouldn't be too hard in bash, putting in something like
echo theinternetisREALLY{,','}REALLY{,','}{,REALLY}{,','}{,REALLY}{,','}{,REALLY}{,','}{,REALLY}{,','}{,REALLY}{,','}{,REALLY}{,','}greatI probably fucked something up w/the commas
Would probably give you all the possible combinations according to your rules.
Nah you're fucked.

Technically, amount of clothes doesn't have anything to do with it being CP or not, it really depends more on the poses that is being shown
So yeah, a yuge ton of candy doll is technically CP.

It'll be the same year that Hitler returns and jews are gassed.

Only if you post some of that sweet CP.

law.cornell.edu/uscode/text/18/2256

Is very vague, I'm sure they can prosecute for most images if they wanted.

So, next year?

just upload an image of the drive and let an user do it for you you useless sack of sage shit OP

yeah actually on second thought dont upload an image of your drive. just kys instead.