Author

Topic: I forgot my TrueCrypt volume password - and got it back. (Read 5408 times)

full member
Activity: 154
Merit: 100
I guess it wasn't in my 'design spec' as I only had 7 or 8 to try, it was more so I could ensure I got the spelling right Smiley
hero member
Activity: 532
Merit: 500
At some point Windows will explode as their is no delay or watchdog for the truecrypt.exe. If you wanted to read a large list you would be better to use a real programming language with file_read and shell_exec etc

Indeed, and always remember to clean up after. You don't want to have a memory implosion. (Memory Leak)
hero member
Activity: 642
Merit: 500
Evolution is the only way to survive
thanks for sharing ur information!
full member
Activity: 154
Merit: 100
At some point Windows will explode as their is no delay or watchdog for the truecrypt.exe. If you wanted to read a large list you would be better to use a real programming language with file_read and shell_exec etc
hero member
Activity: 675
Merit: 507
Freedom to choose
thanks for this, good to know if i never need it.
full member
Activity: 154
Merit: 100
(I see people asking how to do stuff like this all the time, so hopefully this thread is a lil helpful.)

I had forgotten my TrueCrypt volume password. I knew it could have been one of a few possible combinations so I made a Windows .bat file to find it;

Code:
FOR %%A IN (password1 password2 password3) DO "C:\Program Files\TrueCrypt\TrueCrypt.exe" /a /s /l x /q /v folder.tc /p %%A
/a - auto-mount
/s - silent (with no pop-up windows)
/l - drive letter (x)
/q - quit when complete



I made a list of the possible password combinations and put them in as password1 etc above.
Save this as filename.bat and run it. Ensure 'folder.tc' is the path to your volume, and the TrueCrypt path is correct.
If it works, you will find your volume mounted on X:\ when it has completed. I just moved the contents to a new volume with a known password.

This is probably Computers 101 for most users, but if you don't know, now you know, bitcoiner!
Jump to: