Kali Linux – TrueCrypt
During a penetration test, you will have access to sensitive client information, including exploitable vulnerabilities and copies of successfully breached data. It is the tester’s legal and moral responsibility to ensure that this information in his care is secured at all times. The best means of meeting this responsibility is to ensure that all client information is encrypted during storage and transmission.
We explain to you how to use TrueCrypt only for education purpose to learn basics about creating an encrypted folder on Kali Linux.
You should download TrueCrypt only if you are migrating data encrypted by TrueCrypt.
WARNING: Using TrueCrypt is not secure
How To Install TrueCrypt on Kali Linux
To install TrueCrypt use this command :
root@kali~# git clone https://github.com/AuditProject/truecrypt-verified-mirror.git
After Downloading all files, we will go to the folder that contain the installer patch:
root@kali~# cd /truecrypt-verified-mirror/Linux
You can list all the file that contained the linux file with ls command, and extract the file:
root@kali~# tar -xvf truecrypt-7.1a-linux-console-x64.tar.gz
If you have a 32 bit system use the x86 file. After extraction, we will change the installer privileges, and run it, and just follow the steps :
root@kali~# chmod +x truecrypt-7.1a-linux-console-x64.tar.gz
How To Use TrueCrypt on Kali Linux
After installing TrueCrypt on your Kali Linux System, To create an encrypted folder, open the application. You will be presented with the main menu, as shown in the following screenshot: :
On the main menu, select the Create Volume button. This will launch the TrueCrypt Volume Creation Wizard, as shown in the following screenshot:
Select Create an encrypted file container, and then click on Next.
The next screen will prompt for Volume Type, select Standard TrueCrypt volume, and click on Next.
On the Volume Location screen, select Select File. You will be asked to Specify a New TrueCrypt Volume by providing a Name, and indicating that it will save in the folder specified, as shown in the following screenshot:
Chose a filename. Do not choose a filename related to the client being tested, or which indicates that sensitive material is present in the directory. Use a number or code word to represent the client, and a generic title for results.
Save the file on the desktop, then click on Next.
The next screen will provide you with Encryption Options. Select Encryption Algorithm from the drop-down menu. There are several choices, but for regular purposes, AES (the default 256-bit key) will suffice.
You will also select a Hash Algorithm from the drop-down menu (the default, RIPEMD-160, should be sufficient). After your choices are complete, click on the Next button, as shown in the following screenshot:
You will now be prompted for Volume Size. You should have a minimum size of approximately 500 MB, but this may vary depending on the testing regime. Click on Next.
The Volume Password should be selected according to the rules provided for strong passwords. Select and confirm the password, then click on Next, as shown in the following screenshot:
The next screen allows you to select Format Options. For Filesystem Options select FAT from the drop-down menu. Click on Next.
The next screen, Volume Format, creates a random key for the encrypted filesystem. The key is based on mouse movements, and you will be prompted to move the mouse over the window for a long period to ensure the randomness (cryptographic strength) of the encryption keys. When done,
click on Format to create the TrueCrypt volume.
The final volume has been created. It will appear as an icon on the desktop.
Use The Encrypt Volume
To use the encrypted volume, you must first choose a Slot to manage the encrypted folder in the main TrueCrypt menu. When this is done, use the Select File button to select the name of the encrypted file. In this case, we’ll use a previously made file called pentest located on the desktop, as shown in the following screenshot:
Click on the Mount button. At this point, you will be prompted for the password, as shown in the following screenshot:
When the correct password is entered, you will see the Slot 1 details change to reflect the encrypted folder’s properties, and a new icon called truerypt1 will be displayed on the desktop, will be displayed on the desktop, as shown in the following screenshot:
If you double-click on the truecrypt1 icon, you will be taken to a File Browser view.
At this point, it will act as a regular directory, and you can use the folder to store all of the test-related information.
When you work with the contents of the folder, and wish to ensure that all data is encrypted, select Dismount on the main menu. The folder will revert to an encrypted state.
If you have encountered a problem or you have any questions or remarks please feel free to set a comment.
If this article helped you to solve your problem please feel free to share it with your friends … with love and prosperity K4LINUX–TEAM.