Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I would like to hide a 5 byte password for TrueCrypt in the final 5 bytes of MFT record of the MFTMirror record.
And what is the dd command to read the first 30 MFT entries?
Please help and I have installed the kali Linux on Virtual Box.
I assume MFT is the NTFS Master File Table. A virtualbox guest would only have access to NTFS metadata on a USB drive. If you know ntfs internals then the dd link provided should help you dump the table.
I would like to hide a 5 byte password for TrueCrypt in the final 5 bytes of MFT record of the MFTMirror record.
And what is the dd command to read the first 30 MFT entries?
Please help and I have installed the kali Linux on Virtual Box.
Far more information is needed such as what you have tried to resolve this. Why you are using Kali and also do not understand the dd command, and a better explanation of what you are trying to accomplish. If you cannot explain better, than LQ members cannot even begin to try to help you.
Distribution: Debian testing/sid; OpenSuSE; Fedora; Mint
Posts: 5,524
Rep:
You would first need to know the offsets of the MFT. It isn't in any standard place. But I would hide the password in the surplus sectors at the end of the drive. There's always a few thousand sectors at the end of the drive, which didn't quite fit within partition geometry. The system never writes there, because it isn't part of a file system.
Most utilities can't even access surplus sectors, so it's a pretty safe place. But don't use the last sector, because MS uses that as it's disk pi**ing post.
Distribution: Debian testing/sid; OpenSuSE; Fedora; Mint
Posts: 5,524
Rep:
You actually write it directly to the drive platters, not as part of any file or file system. I don't think anyone is going to look there. But, do it how you want.
a bit offtopic..
I don't see a point in using such short password (even if its binary) other than, perhaps, lack of space at that end of disk.
iirc, there was some research and conclusion was that its better to use long passwords with dictionary words than short random ones, or something like that.
edit:
pity hdd manufacturers don't offer rnd filled (instead of zero filled) brand new drives.
yes, they would be harder to make (writing test?), and one would need to trust them, but hey, you gotta trust someone.
a bit offtopic..
I don't see a point in using such short password (even if its binary) other than, perhaps, lack of space at that end of disk.
iirc, there was some research and conclusion was that its better to use long passwords with dictionary words than short random ones, or something like that.
Agreed. I suspect that, in effect, the opening post was a homework question and the "5 bytes" was just a way of the teacher delimiting the question.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.