[Encryption and Decryption] Passware Kit Forensic Violent Aesthetics-Detailed parameter settings for custom decryption of known partial passwords

[Encryption and Decryption] Passware Kit Forensic Violent Aesthetics-Detailed parameter settings for custom decryption of known partial passwords

It is said that "homemade weapons are not necessarily the strongest, but the strongest weapons must be homemade." The same is true for forensic tools. Although the default configuration is strong enough, if we can customize the parameter configuration according to real-time scenarios, then it can often Get twice the result with half the effort—【Su Xiaomu】

1. Experimental environment

system Version
Windows 11 Pro for Workstations 22H2(22621.1702);
Passware Kit Forensic 2019.4.1;

2.RAR encrypted compressed package

The password rules of the known RAR compressed package are: wlzhg@xxxx@xn, where the xxxx part is the part that needs to be cracked.

(1) Specify the regular password format

1. Select the encrypted document

The routine is to select the document that needs to be decrypted and click.

insert image description here

2. Three cracking modes

The initial wizard screen is shown below. Passware Kit provides three cracking modes.

insert image description here

parameter illustrate
Use predefined settings The predefined settings have no information at all about passwords and use default attacks to recover passwords.
run wizard If you know any details about your password, follow the simple steps to set up password recovery, which works with cracking methods that know partial information about your password.
Advanced: Custom settings Manually set up attacks to recover your passwords, custom password cracking parameters.

According to the file format, prioritize the type of cracked password, password length, password structure (combination type), etc., click Save, and start cracking the password.

insert image description here

(2) Custom decryption settings for known partial passwords

Brute force cracking settings: the password starts with wlzhg@, the password ends with @xn, there are 4 digits missing in the middle, and the length of all passwords is 13.

According to the known conditions, it can be directly set to: wlzhg@ *@xn。【星号*and 问号?there are some differences, you can try it yourself, 建议使用星号*]

Just choose one of the two, and the second method is more recommended . The first dictionary cracking method is more suitable for understanding the rules of password composition and then generating a dictionary by yourself.

insert image description here

1. Method 1: Dictionary cracking

Dictionary parameter settings: The maximum password length is 13. (Because it is a competition, 13to13 is more accurate)

insert image description here

2. Method 2: Customized brute force cracking [Recommended]

Advanced settings: Custom characters and patterns.

Select the second pattern (Pattern)! ! ! It only takes a thousand attempts, and it can be cracked basically in seconds.

insert image description here

(3) Brute force cracking error demonstration

It’s not necessarily wrong, but it’s used differently in different scenarios; a warning to reduce unnecessary trouble.

1. Parameter setting error 1: password length

Because it is a competition, the number of password digits and the missing digits have been clearly given. Just set the password length according to the given digits. Don't add unnecessary information and waste time.

Of course, if you are not sure about the password length, you can try more, but it will take more time.
insert image description here

2. The known password part is not fully set.

Because the password is missing the middle part, the first parameter set is dictionary cracking (local unlinked dictionary). Secondly, in the known part, the second half of the password dictionary is missed, resulting in a geometric increase in the number of cracks and a waste of time and computing power.

insert image description here

3. Check Custom characters (Custom characters)

In this test, although PasswareKit was also used, the number of attempts after checking reached 137561 times, which is more than ten times more than the single-check mode (Pattern); for some unknown passwords, it takes more time, which is generally clear It is not recommended to check this option for some passwords.

insert image description here

Because there are only 4 digits, it can be cracked quickly.

insert image description here

*Other cracking methods

[Encryption and Decryption] Detailed tutorial on using HashCat to crack encrypted files in RAR compressed packages - Article Channel - Cryptography - Public Learning Circle (writebug.com)

[Encryption and Decryption] Detailed tutorial on using HashCat to crack encrypted files in RAR compressed packages_Su Xiaomu's Blog-CSDN Blog

Summarize

If you have time, you may be able to get the answer by trying one more step.

The writing is one-sided and is purely for record keeping. Any errors or omissions are welcome to be corrected.

[ The ownership of the work belongs to the author [Su Xiaomu], please indicate the source of the article when reprinting ]

References

Passware Kit Forensic cracks all passwords when part of the password is known_Zhiyuan's blog-CSDN blog

[Encryption and Decryption] Passware Kit Forensic pure digital password cracking tutorial_passwarekit product key_Su Xiaomu's blog-CSDN blog

[Encryption and Decryption] Passware Kit Forensic Custom Decryption Type Tutorial_Su Xiaomu’s Blog-CSDN Blog

name time
Start editing date September 2, 2021
Last edited date May 11, 2023

Guess you like

Origin blog.csdn.net/NDASH/article/details/130618814