TCHead is software that decrypts and verifies TrueCrypt headers.
TCHead supports all the current hashes, individual ciphers, standard
volume headers, hidden volume headers and system drive encrypted headers
(preboot authentication).
Brute-force TrueCrypt : However, TrueCrypt passwords go through
many iterations and are strengthened. Cracking them takes time. Very
strong passwords will not be cracked. Also, in addition to trying
multiple passwords an attacker must try each password against each
combination of hash and cipher (assuming they do not know what these are
beforehand). System encrypted hard drives use only one hash and cipher,
so attacking those is faster.
Testing TCHead: Create a TrueCrypt volume using the default hash
and cipher (RIPEMD-160 and AES), set the password to "secret", then run
TCHead against it like this and it will decrypt the header (provided
that the word "secret" is in the word list)
Command : TCHead -f name_of_volume.tc -P words.txt
Decrypt hidden volumes:
Command : TCHead -f name_of_volume.tc -P words.txt --hidden
Multiple passwords (brute-force): Create or download a list of
words in a text file (one word per line) using words that you think are
likely to decrypt the header, then run TCHead against it like this. If
the correct password is found, the header will be decrypted:
Command : TCHead -f name_of_volume.tc -P words.txt