Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 4 Dec 2014 15:59:25 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Recovering password given the unpacked data available

On Thu, Dec 4, 2014 at 3:07 PM, Rostislav Khlebnikov
<r.khlebnikov@...il.com> wrote:
> Thank you,
>
> I will try that. Actually I already did - even had to compile the x64
> version of pkcrack, but with no success. I will try to figure out what am I
> doing wrong. For one of the files no matter what level of compression I use
> (7-zip or WinZip) I can't get the compressed plaintext file to be smaller
> than the extracted encrypted file, which is rather strange. My wife
> remembers parts of the password, so I will try dict attack too... Eh.
> Thanks for help anyway! :)
Elcomsoft used to do this, it's a very old attack, and as stated does
not work on recent or AES encrypted archives
http://www.elcomsoft.com/help/en/archpr/
Passware I think could also do the attack, but they are both
commercial offerings.
http://www.lostpassword.com/attacks.htm#plaintext
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.