TRUECRACK v3.5: EXAMPLES
------------------------
website: http://www.truecrack.net , http://code.google.com/p/truecrack
mail:    infotruecrack@gmail.com

1. Bruteforce attacks: 
- Dictionary attack: truecrack -t ripemd160_aes.test.tc -w passwords.txt
- Alphabet attack:   truecrack -t ripemd160_aes.test.tc -c tes -m 4

2. Standard volume with different key derivation functions: password "test"
- PKCS5 hmac-ripemd160 & AES-XTS : truecrack -t ripemd160_aes.test.tc -w passwords.txt
- PKCS5 hmac-whirlpool & AES-XTS : truecrack -t whirlpool_aes.test.tc -w passwords.txt -k whirlpool
- PKCS5 hmac-sha512    & AES-XTS : truecrack -t sha512_aes.test.tc -w passwords.txt -k sha512

3. Standard volume with different encryption algorithms: password "test"
- PKCS5 hmac-ripemd160 & AES-XTS     : truecrack -t ripemd160_aes.test.tc -w passwords.txt
- PKCS5 hmac-ripemd160 & SERPENT-XTS : truecrack -t ripemd160_serpent.test.tc -w passwords.txt -e serpent
- PKCS5 hmac-ripemd160 & TWOFISH-XTS : truecrack -t ripemd160_twofish.test.tc -w passwords.txt -e twofish

4. Standard volume from backup header: password "test"
- PKCS5 hmac-ripemd160 & AES-XTS : truecrack -t ripemd160_aes.test.tc -w passwords.txt -b

5. Hidden volume: password "test", password hidden area "hidden"
- PKCS5 hmac-ripemd160 & AES-XTS : truecrack -t ripemd160_aes.test.tc -w passwords.txt -H

6. Hidden volume from backup header: password "test", password hidden area "hidden"
- PKCS5 hmac-ripemd160 & AES-XTS : truecrack -t ripemd160_aes.test.tc -w passwords.txt -H -b

7. Partition/device-hosted: password "test"
- PKCS5 hmac-ripemd160 & AES-XTS : truecrack -t /dev/sdb1 -w passwords.txt
