top of page

VeraCrypt

Updated: Sep 29, 2023


VeraCrypt logo.

In this blog:

This is a continuation of the Steghide walkthrough - found here ➡️


What is VeraCrypt?


VeraCrypt can be downloaded on Mac, Windows, and most other Linux based operating systems.


It is a free and open source disk encryption program.


VeraCrypt can create virtual encrypted disks, encrypt partitions, or encrypt the entire storage device with pre-boot authentication.


Uses enhanced security in algorithms which makes it fairly immune to advancements in brute force attacks.


The latest Linux tarball of VeraCrypt can be found at https://www.veracrypt.fr/en/Downloads.html ➡️

VeraCrypt website.
VeraCrypt website.

Installation


The software downloaded into my downloads folder.


To make it easier to find, I made a new directory called VeraCrpyt and moved the download file into this directory.


I completed both commands in one using the pipe function.


Type ➡️

mkdir veracrypt | mv <veracrypt tarball> veracrypt
 Moving the tarball install to a new VeraCrypt directory for ease of use.
Moving the tarball install to a new VeraCrypt directory for ease of use.

Open the file. There are 32-bit and 64-bit versions for both the command line and gui versions of the software. Download the 64-bit gui version of veraCrypt.

Choosing the 64-bit gui version for download.
Choosing the 64-bit gui version for download.

Extract the bottom file and head to the terminal and use ./ to start the program.

Starting the chosen setup installer.
Starting the chosen setup installer.
Install prompt.
Install prompt.

I went with option 1.


Read the terms and conditions (or don’t) and click enter to exit the prompt.


Go to the start menu and search for VeraCrypt. It should be available now.

VeraCrypt home page.
VeraCrypt home page.

Creating an encrypted file container


Go to Volumes and create new Volume.

Create New Volume.
Create New Volume.

Create an encrypted file container.

Create an encrypted file container.
Create an encrypted file container.

Go to where you saved the extracted file and create an empty file named lock-container.


Choose standard VeraCrypt Volume and choose the lock-container file to save it to.


I will choose the default encryption options.

Encryption standards.
Encryption standards.

For the size I will choose an arbitrary 750 MB.

Selecting volume size.
Selecting volume size.

For the password, I have a random password generator script that I wrote.


Click here to see a breakdown ➡️ https://spcyber.wixsite.com/shonepcyber/post/password-generator-python

Random password generator script.
Random password generator script.

For the next page, I stuck with the default FAT filesystem for the volume format.

FAT file system.
FAT file system.

For the final step, move the mouse around inside the window as randomly as possible as this will allow the cryptographic generator to create a stronger encryption key. Then click format.

Mounting devices


Click on a slot and select the lock-container file and click mount.


You will be prompted for the password you set when creating the VeraCrypt account and then you will be asked for your administrator password.

Select the lock-container to place in the first slot.
Select the lock-container to place in the first slot.

The volume is mounted and created in the /media/veracrypt1 directory.

Checking Mount Directory.
Checking Mount Directory.

Inside locked-container


I will use the lbkl (list block) command which lists block devices (devices that are read and written to a block at a time, usually 512MB – common block devices include hard disks.)

lsblk command to list block devices.
lsblk command to list block devices.

You can create a folder in the encrypted VeraCrypt directory.


I have created a test file named secretfolder1 and also moved the black hole image I used for the steganography to this directory to encrypt it so I don’t leave any tracks behind.

Moving files into the encrypted folder.
Moving files into the encrypted folder.

Now we can exit out of the command line and click dismount in VeraCrypt.


Checking the directory now shows that it doesn’t exist. Our files are encrypted and hidden.

Locked-container folder is hidden.
Locked-container folder is hidden.

To see our files again, startup VeraCrypt and mount the lock-container file with your passwords.


In the command line we can now see our unencrypted files.


1 Comment

Rated 0 out of 5 stars.
No ratings yet

Add a rating
Guest
Jul 31, 2023
Rated 4 out of 5 stars.

Great

Like
  • GitHub
  • Twitter
  • LinkedIn
bottom of page