![]() |
|
Message-ID: <CANWtx01+2KG=yvDrXOnQsgpJnh-wnX7_xhQW2erhdkbA6t6Fxw@mail.gmail.com> Date: Thu, 4 Dec 2014 15:59:25 -0500 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com Subject: Re: Recovering password given the unpacked data available On Thu, Dec 4, 2014 at 3:07 PM, Rostislav Khlebnikov <r.khlebnikov@...il.com> wrote: > Thank you, > > I will try that. Actually I already did - even had to compile the x64 > version of pkcrack, but with no success. I will try to figure out what am I > doing wrong. For one of the files no matter what level of compression I use > (7-zip or WinZip) I can't get the compressed plaintext file to be smaller > than the extracted encrypted file, which is rather strange. My wife > remembers parts of the password, so I will try dict attack too... Eh. > Thanks for help anyway! :) Elcomsoft used to do this, it's a very old attack, and as stated does not work on recent or AES encrypted archives http://www.elcomsoft.com/help/en/archpr/ Passware I think could also do the attack, but they are both commercial offerings. http://www.lostpassword.com/attacks.htm#plaintext -rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.