-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Share dump key #11
Comments
Have you considered simply using the TrueCrypt key dumper that we provided? |
This key dumper works without keychip plug on the ring ? |
Truecrypt is still used by the underlying system, and TrueCrypt keys are still passed, even though the physical keychip is not queried. |
Don't forget the EWF is active, and you need to grab the keys before powering down the drive. Hot Swap works fine. Make sure you've replaced the original truecrypt executables with the dumper. Then #Profit. |
it doesnt work for me sure im doing something wrong . maybe i unplug to late or something else |
The patched TrueCrypt is confusing somehow. snprintf(filepath, sizeof(filepath), "C:\\keyfile_%d.bin\0 EDIT PATH HERE", asd); On the binary patched exe, the "EDIT PATH HERE" is D:\keyfile_%d. So the files are dumped on D drive root. |
Thank you very much for this. I was using the patched truecrypt with RE2 and was wondering why I wasn't getting keyfiles at all - (I had to resort to the other method of disabling mxprestartup and accessing windows through systemuser). From Windows I could see that there was not always a D: drive, partition 2 would sometimes mount as Z: and sometimes it wouldn't mount at all! Suggest patching truecrypt so it dumps to root of C. Cheers. |
Hi every one ,
I have some game without keychip and i wanted to rekey them To use them . If someone can share them thx .
Keys are : sddy and sdcu .
The text was updated successfully, but these errors were encountered: