Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Alphabet Attack]: Went through the correct password, but was not recognised as correct. #46

Open
GoogleCodeExporter opened this issue Mar 24, 2015 · 1 comment

Comments

@GoogleCodeExporter
Copy link

I am currently using Truecrack V3.0 on Kali Linux 1.0.6 and does not have CUDA 
activated. I have keyed in the following command to run an alphabet attack;

$ truecrack --truecrypt tcTest1 --charset aple -s5 -m5 -v 

(Note: The password is apple)                                                   


However, when I run the test, the computation has already reached the 
characters 'apple' but did not recognized it as the password of the file.

Output was:
..
..
914     laple           NO
915     eaple           NO
916     apple           NO <<<<<<
917     ppple           NO
918     lpple           NO
..
..
1022    leeee           NO
1023    eeeee           NO
No found password
Total computations:     "1024"


I am wondering where have I gone wrong and any alterations I should make in 
order to successfully get 'apple' to displayed as 'YES'?



Original issue reported on code.google.com by daisyariasy on 20 Feb 2015 at 3:32

@keizu5
Copy link

keizu5 commented Jan 31, 2016

In the file CpuCore.c in the function cpu_Core_charset the termination character is not correctly set after combining prefix and word.
It should also be checked if there would be an array out of bounds access when using words of length MAXWORDSIZE. This may be caused since the char array "word" is MAXWORDSIZE long, so there is no space left for the termination character.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants