I use linux mint 20.2 and the file system of the encrypted vc-partition is ntfs.īefore i try to recover the partition (testdisk did not find it, gpt is broken, the beginning of the potential partition is overwritten with 00 etc) i would try to recover these containers. Does anyone have a good „cfg“ which can find those containers? Which kind of data source should i chose? Which „device“ or file? I know the names of the containers and the approximate size. So now i wonder if/how autopsy can find and recover the containers. There are two more „devices“ which have the same size and content: To open a disk image locally in Disk Decipher the disk image. I also tried to restore some files with photorec and this was successfull as well. How do I open a disk image in Disk Decipher. I then examined the content of /tmp/.veracrypt_aux_mnt2/volume and i could see some pattern which indicate that the partition was encrypted successfully. Veracrypt -t -filesystem=none -m=headerbak -k “” -pim=0 -protect-hidden=no /dev/loop11 After a bit of research i likely could encrypt the partition without mounting its files system (cause it is damaged) like that: But i think i found it and i have backups of all headers. I dont know what exactly happened to it but i lost the veracrypt partition. In short: i stored 1 truecrypt and 1 veracrypt container (or 2 truecrypt or 2 veracrypt containers) on a veracrypt-partition. VeraCrypt version 1.25.9 Latest Binaries for FreeBSD, Linux, macOS and Windows are available at Launchpad and Sourceforge.
0 Comments
Leave a Reply. |