doc/DiskCryptor-HOWTO.md
Heres are steps to crack DiskCryptor encrypted partitions with JtR Jumbo.
Extract DiskCryptor hashes from DiskCryptor encrypted partitions.
$ ../run/diskcryptor2john.py # see program's help
$ ../run/diskcryptor2john.py /dev/sdb1 >> hashes
The diskcryptor2john.py program requires Linux to run. See step 2, in case
you don't have Linux and want to get Linux going quickly.
(Optional) Install SystemRescueCd to a USB stick. Boot from this USB stick.
Get SystemRescueCd ISO image from http://www.system-rescue-cd.org/Download/ page.
Use Rufus to burn this ISO image to a USB stick.
Boot a machine from this USB stick.
Some useful debugging commands -> fdisk -l, dmesg, lspci.
Run john on the extracted hashes.
$ ../run/john hashes
For taking advantage of GPU acceleration, use a command like,
$ ../run/john --format=diskcryptor-opencl hashes
See the help files included with JtR Jumbo to customize your attacks.