TrueCrypt Tutorial: Encrypt Your Hidden and “Hidden” Files

Posted: 04/22/2012 in G.N.A.HackTeam, Hacking, Info, Linux Hacking, Mac Hacking, Windows Hacking
Tags: , , , , , , , , , , , , , ,

Truecrypt has many great functions. I will explain one of the most interesting ones. Hiding a REAL Encrypted Volume into a Fake-Encrypted Volume. Let me explain the whole notion and give an example:

You create a volume encrypted by a password. In that volume you have some files encrypted. Inside that encrypted volume, you create another encrypted volume that contains the REALLY Encrypted Files. This means that you have two passwords.

Here is an example that can be implemented in real life:

You are a hacker and just hacked a government website without taking much protection measures. The Police comes and knocks your door.

You have the encrypted volume. The Police asks you to decrypt it or you go to jail. What you can do is to decrypt it with the fake password so as to show files that you don’t really care about.

However, your real files that nobody should have access to them, are encrypted and well-hidden by an AES256 Algorithm and Hashed by SHA512.

It is more likely to win a Lottery and become a millionaire than to decrypt the files! 😛

Let’s Begin our Main Tutorial:

– So, Open up Truecrypt and click on the “Create Volume” Button:

This window should Pop-up

– Next, hit the “Create encrypted Container”.

– Now, click on the “Hidden Truecrypt Volume”.

– The first Volume is the “Not that great” one. In that volume you will store data that is not that classified (Truecrypt calls it Outer-Volume). Browse where your file should be Placed.

– Select the Encryption and Hash Algorithms you want the File to have. I recommend you AES (for encryption algorithm) and SHA512 (for hash algorithm).

(Tip: Make sure that is a password that you can remember. Otherwise, someone can suspect your trick, if you don’t or show that you try to remember it.)

– Choose the Size of the Volume (Depends on you. You can create a small file to store documents, or a 4 GB file to store program installers, etc…)

– At the Next Window it generates a unique key your Outer-Volume Uses. Just move your mouse around the Window, click on Format and the Outer-Volume is Created!

_____________________________________

– Let’s start creating the Hidden/Classified volume (Truecrypt calls it Hidden-Volume). It’s about the same thing…

Choose the algorithms (Doesn’t matter if they are the same as before…).

Enter the Size. (I recommend you to be about the half or something more than the previous volume)

– Enter the Password (The password should be different than the previous Volume or Truecrypt will NOT know which is the Hidden one!)

                 — I recommend you to enter a strong password on this one because character-only or number-only passwords are easy to Brute-Force (Cracked). Use characters, symbols, numbers, dots and dashes, the @ symbol etc…)

– Choose the Filesystem. I would strongly recommend you to select FAT. FAT can be read from Windows, Mac and Unix (Linux-Like) OSes. However, FAT cannot store files more than 4GB (!!!)

– Move the Mouse around and Format.

Both Volumes created!

Now, to open the file do as below:

– On the Main Screen of Truecrypt, click on the Select File. Browse and Select the File you Created.

– Click on a Slot –> Preview Here…

– Click on the MOUNT Button.

– It will ask you for a Password. If you enter the Outer-Volume’s Password, It will open the Not-That-Classified Volume.

– If you enter the Hidden Volume’s Password, it will open the Classified Volume.

– Please notice that when you enter the password, Truecrypt mounts the Volume. (Like what the PC does when you put a USB Drive)

– You can open the Volume by Double-Clicking the Slot you chose. Or by going to ‘My Computer’ and open the Volume ‘Truecrypt 1’ (or something similar).

LINKS:

Download Truecrypt: truecrypt.org/downloads

<?TUTORIAL BY AKATZBREAKER/>
Advertisements
Comments
  1. I hope you like this tutorial!
    It is really important for Everyone who uses a computer! (Hackers, Bussinessmen, FBI 😛 )

  2. i bookmarked you in my browser admin thank you a lot i will be seeking your upcoming posts

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s