This project has moved. For the latest updates, please go here.

Is it possible for a hacker to make a copy of Veracrypt encrypted partitions and crack the encryption later.

Topics: Technical Issues, Users Discussion
Oct 27, 2015 at 11:27 PM
I know if the encrypted file containers remain as files, the hacker can backup a copy and perform attack later. How about a non-system hard drive partition encrypted by Veracrypt? Could the hacker backup a copy a the partition and perform brute force attack later?

Thanks.
Oct 28, 2015 at 3:47 AM
Edited Oct 28, 2015 at 3:48 AM
Mounir has posted on the topic of password length and its entropy that would be worth reading.
http://sourceforge.net/p/veracrypt/discussion/general/thread/09696187/#491d
Oct 28, 2015 at 2:06 PM
Yes, the attacker can create a image of the partition and then reproduce this image as many times as he wishes so he can use it on multiple machines to speed up the attack. In other words, it is more or less the same as with file container. However, for less experience attacker (in that case is he an attacker at all? ) it will be more difficult to take an image of the non system partition then to copy your encrypted volume/file.
Oct 28, 2015 at 4:30 PM
Right. I actually found a tool that can image a hard drive sector-by-sector. I guess this kind of thing can be used for the concern I mentioned.
http://hddguru.com/software/HDD-Raw-Copy-Tool/