91

TFFW you regret the decision of using “truecrypt” on a hard drive back in 2012......... and then forgetting the key...

Comments
  • 3
    I don't understand
  • 13
    @ThatDude I’m seriously contemplating jumping out my office window. Although I had completely forgot about this hard drive, I’m still very heart broken. I knew I had a drive with some on it, I just didn’t realize the extent until a friend recently sent me a picture of my address and reminded me. Will pay for someone to off me.
  • 3
    @gitpush neither do I. But I want this to be fake :-P
  • 4
    @MojoJojo hahaha it doesn't seem so though I hope he gets his data back cuz it seems to be something really bad right now :S
  • 12
    What’s not to understand? Lol sorry... I’ve got a hard drive that’s encrypted, I don’t remember the key, my friend sent me my old wallet address, that’s how much is on this $153,000 paperweight hard drive now.
  • 9
    The encrypted drive has some of the bitcoins I had mined back in 2012.
  • 9
    DAAAAAAAMN!!!!! :O :O :O :O
    Hope you remember that key bro, wish you all the best :)))
  • 11
    train a machine learning instance for guessing the password...
    until then you'll be a millionaire 😄
  • 8
    At some moment in your Life you will even gonna remember your first 63char WPA, memory is weird, let the password come.
    If you wanna end yourself do it for the fun.
    >:)
    *Satan laughing*

    Jokes aside..
    Was It long and complicated? Le's do the math for bruteforcing
  • 8
    https://tools.kali.org/password-att... here is 1 thing I found to try to get back in
  • 7
    @inpothet if this works, you will be receiving a nice tip, thank you.

    @devNaut the pass was 64 characters long and generated randomly. 💔
  • 5
    @inpothet would take years though
  • 5
  • 3
    @AnonyOps well do as they say and use a GPU to accelerate it, if you have multiple GPU run multiple instances I guess
  • 8
    How did you.used to store your password mabye you have a backup or remember part of it, that way you can use masks to make it take shorter
  • 4
    What password manager did you use? I'm guessing you didn't type those 64 characters by hand.
  • 3
    Hire someone to hack it
  • 2
    @virus200 Curious what they’d have that I don’t to be able to crack a 64 character password in under a lifetime+ lol. Even with GPU or CPU brute force a password like this would take lifetimes to crack.
  • 3
    @AnonyOps I'm the wrong guy to ask man lol but consulting a cubersecurity specialist of some sort couldn't hurt
  • 8
    @virus200 lol I am in cyber security 😬
  • 4
    @virus200 I’m taking to a few friends of mine that are further in the industry than I’d ever be able to get to and all are as heartbroken as I am lol.
  • 2
    @AnonyOps you're fucked lol
  • 2
    Just laugh about it. It's the only method I found to cope with this BTC shit.
  • 2
    Security Analysis of TrueCrypt
    https://bsi.bund.de/SharedDocs/...
  • 2
    @AnonyOps hmm, what about brute forcing on like 20 or so servers, trying 1/20 of the possible outcomes? I wonder what that would do for you.
  • 3
    Actually forget that, I suppose that would take forever (I read it as 64 bit for some reason). I wonder if true crypt has any vulnerabilities back then. Might be worth seeing if they had any security oriented bugs since then. Also some encryption has been deemed crackable since then, might be worth looking into.

    Another thought I had, random number generator oftentimes aren't random enough, that might be an attack vector to try if you can remember what you generated it with.

    Another thought, you've probably done this but think back to what was in Vogue at the time and was new and exciting to try out, maybe your database of passwords is stored on an old drop box account or something.

    That's it, those are all my ideas and leads. Hopefully that helps.
  • 3
    I pray to cthulu that you will find the password
  • 3
    @heyheni interesting, I’m going to have to look into this more. I stayed up until 3am last night reading it, I appreciate it!
  • 4
    @AnonyOps dont forget to write a medium.com blog about your motivation to become a crypto cracking machine learning pen testing expert 😉

    here is a video about weaponizing machine learning from the hacker conference defcon17
    https://youtu.be/wbRx18VZlYA
  • 3
    TrueCrypt isn't being developed any further, is it? They may have a reason, probably a vulnerability
  • 3
    https://m.heise.de/security/... this article is from 2013. I know it's german, it says that you can only crack passwords til 55 symbols... but the article is 4yo
  • 5
    dont forget to clone that old drive to a new ssd @AnonyOps
  • 6
    FUCK! Now the wallet is $200,000
  • 3
    Sorry for my ignorance but say you mined 2 BTC in 2012 - How do you know that the blockchain you had back then isnt outdated and therefore may be rejected by the current blockchain everyone else has? I mean, is there a chance you wont be able to claim the bitcoins anyway?
  • 3
    @bioDan either way I can’t claim anything due to it being encrypted, the bitcoins are still on the offline wallet, what would make them not be usable if I had the key and could access them?
  • 1
    Just like USD, no matter what the year they still keep their face value. Or am I not understanding what you’re asking?
  • 1
    @AnonyOps forgive me if this sounds dumb but is it possible to write some code that will loop through all possible password combinations at 64 character length? Even if it took a year to cycle through you'd still get it eventually. Maybe I'm just talking some movie shit I'm new at this haha.
  • 5
    @virus200 it would take a lifetime.
  • 2
    @ThatDude his computer just needs MORE POWAHHH. maybe you can have IBM Watson run the code haha.
  • 3
    Lol 😂 yeah, even if I had access to supercomputers it would be after my lifetime that it gets even probably halfway done trying to run through all the combinations.
  • 2
    @AnonyOps technically it only has to run combinations till you find the right one 😂 Watson processes 500GB of data per second that's pretty damn good lol
  • 3
    FUCK!!!!!
  • 2
    Literally 1 minutes later
  • 2
    @AnonyOps better start coding lol
  • 2
    Seriously tho why are there no failsafes for this shit
  • 2
    @virus200 Lol I’m capable of brute forcing; anyone is really... The time though, I don’t have. If it can take 2 centuries to crack a 12 character password, put 64 characters into perspective.
  • 2
    @ThatDude Believe me, I’m trying... so damn hard. I’m coming up on 68 hours of no sleep due to searching and testing things. Bitcoins are predicted to hit$40,000-$60,000.... I’ve got to figure something out.
  • 1
    @ThatDude Tag no work 🤔
  • 1
  • 1
    And the 2 centuries is just for a 12 character A-Z password. There’s so many combinations.
  • 2
    @ThatDude My dude, you’re not the one that is setting on a $200,000 dollar paper weight. If anyone is retarded, well... it’s me. 💔😭
  • 2
    Fucking hell dude!
  • 1
  • 1
    Literally a matter of minutes it moves up.
  • 1
    2 minutes later and it’s $1,000 more lol.
  • 1
    Lol my other wallet is keeping me from doing anything drastic, although it has nowhere near the cash this one has... what goes up, has to come down I guess. I’m just trying to get as much as I can before it does fall down lol.
  • 2
    Time to quit your day job. You need more time
  • 1
    @virus200 I hire you ALL to help me, I’ll pay once we crack it!
  • 2
    You used something called true Crypt right? Maybe contact the company who made true crypt
  • 2
  • 2
    If it works ill take payment in the form of Bitcoin
  • 2
    @ThatDude if it does I expect compensation lol
  • 2
    *waits for response*
  • 1
    Lol TrueCrypt is no longer around. There is no support for it.
  • 1
    It’s still bruteforcing and it’ll take centuries lol.
  • 1
    I just don’t have the time nor the power to brute force sadly
  • 1
    I’d love to obtain it via brute, but it’s simply not possible with what I’ve got my hands on, and as stated early as well, a 12 character password can take up to 2 centuries to crack. Why can’t I be immortal (jk that would be a curse) and have a time machine?!
  • 2
    Give me the paper weight then. I'm just saying but if I had 200k sitting on a hard drive I'd be moving heaven and earth to Crack it.
  • 1
    @virus200 Lol I’m trying all I can do, but you can’t push a brute to to any faster than what it is. My hardware simply is limited, the only thing that would help is faster times. Look up brute forcing, look up how long it would take to crack just an alpha 64 character password, you will then understand that this isn’t something that can just be done in a blink of an eye lol, even though I want it to... NSA can’t even do it, this is why encryption is you’re fucked if you don’t have the password or a backdoor, but a backdoor would defeat the purpose etc.
  • 1
    @ThatDude I have been lol, that’s why I’m running on no sleep. I’ve moved three different times sense 2012, things are a little more difficult than you guys know lol 😂 😭
  • 3
    And if I had the ability to get this password back, I might as well attempt to obtain every private key to bitcoin wallets all over the world lol
  • 4
    Estimate
  • 3
    Best get started
  • 3
    Pay a forensics lab?
  • 2
    Any updates
  • 1
    Brute force, no matter who you are, with an encryption of this nature, will take ages. I’ve got to find another way in. Working on vulnerabilities and testing as we speak.
  • 1
    Hit up Ed Snowden
  • 3
    Comment to get updates
    This is interesting.
  • 3
    Ask Microsoft. They might have kept the password on their servers when you generated it 😛
  • 4
    How's the situation?
  • 3
    Still stuck, I was able to preform a few of the vulnerabilities @heyheni had posted earlier in this thread, but one was a “write only” and you couldn’t see anything else on the drive. Still trying some other things but idk.
  • 2
    @AnonyOps ah, would have been too easy to be real.
    But stay positive and good luck!
  • 3
    @lucaIO thank you! I’ll keep you updated!
  • 2
    @Nitroretro not a damn thing...
  • 2
    I’ve got a friend that works in a lab that wants to test his luck, it’s out for delivery.
  • 3
    This is so depressing lol..
  • 3
    HaaHHAahahaAhHhaHAHA 🙃🤬😭 my friend called me, the hard drive was dropped. I love when someone turns on a fan and shits into the blades while I’m on the receiving end.
  • 3
    @AnonyOps what? And you sent it without backing up?
  • 2
  • 2
    @AnonyOps oh, didn't know about that. Damn...
  • 1
    @shellbug Tis alright! Idk what the next step is. He works in a lab for computer components so he’s got the capability to take apart things like this in a sound environment with the proper equipment. Not all hope is lost yet.
  • 1
    📌
  • 3
    @AnonyOps if you can write a certain string to the encrypted container you could in theory diff the old drive blocks with the blocks after the write to try and find the new data (you know) in encrypted format. Then you could work out the key used because you know the algorithm, the clear text data and the encrypted data. That's how codebreaking works when you have write access.

    Don't know if truecrypt ever mitigated against such attacks with random byte allocation or something like that but it might be worth a thought
Add Comment