Author: Zhongguancun online Zhang Qi
1st page: high skill in Cracking
Encryption and decryption are a permanent hot topic. What kind of encryption is secure? How can we unlock common passwords? Have you realized that there are too many insecure factors in your daily passwords and protections? Today, I will take you closer to the world of cracking and encryption to see what security risks are bothering you.
I. high skill in Cracking
1. BIOS
The BIOS is short for "Basic Input Output System". After literal translation, the Chinese name is "Basic Input Output System ". We often encrypt the BIOS for a more comprehensive protection system. This seemingly "safe" approach also has vulnerabilities (this article discusses BIOS password cracking only for desktop computers ).
First, we can obtain some common passwords for future use. For example, Award universal passwords include: Wantgirl, Syxz, dirrid, Award, Ebbb, 589589, and so on. The universal PASSWORD of ami bios is AMI, BIOS, PASSWORD, hewitt rand. Of course, this is not a good method, because if we forget the password we set, how can we remember these complex universal passwords?
Another method is the Debug command. If the computer can boot normally (we can use a boot disk at will), but cannot enter the BIOS, it means that the machine has set the BIOS to change the password. This password is used to prevent unauthorized users from setting the BIOS. However, you can use the Debug command in the DOS Status to manually clear the password. The specific operation is as follows:
C:> DEBUG
-0 70 10
One O 71 01
Yiq
Or
C:> DEBUG
-0 70 2e
-O 71 00
One O 70 2f
-O 71 00
Yiq
After restarting the computer, you can directly modify the settings in CMOS without asking for the password.
2. System Password
Can someone else be unable to access the system by adding a password to the system? If you think so, it would be a big mistake. After selecting a small tool, we can crack the XP Password in less than a minute.
First. First, create a boot disk containing the password.exefile, and run password.exe after using the boot system. After running, select the first item to enter the custom mode. Press 1 and press Enter. Next, select the system partition. You can also determine which disk is c Based on the capacity, select the corresponding serial number, and press Enter.
At this time, the software will automatically search for the password file, press enter to confirm, then the user list will appear, select the corresponding user (recommended to select a green user name), press enter to continue to confirm. The software asks if the password is cleared. Press Y and press enter to confirm. Then, the software will prompt that the corresponding user password has been cleared. Press enter to return to the main interface.
After the system is restarted, log on with the user who just cleared the password and find that the user can directly access the system. Everything is so simple. Will XP be hard to crack? Of course, it is important to remember that a menu is displayed after password.exe is run? What is the use of the 2nd items? After you select option 1, the software will automatically search for the password file on the current hard disk, saving you the trouble of selecting a partition. Although the password file can be searched automatically for the first item, because partition is not selected, if you install multiple systems, you may find multiple password files, you need to select the password archive for the corresponding system.
Tip: If you think this method is complicated, I will tell you a opportunistic method. However, this method is not omnipotent, but a "psychological suggestion. In general, you will set your username and password when installing XP, while the default administrator does not have password protection. Therefore, when you start the logon interface, press CTRL + ALT + DEL twice to convert to the traditional logon box. Enter the administrator user name and the password is blank. Maybe there will be surprises.
3. Office Password
Everyone is using the Office software. For some important documents, the password will be set for them in case they are not checked. Setting a password for a file is a good thing, but now it is almost everywhere to set a password, which makes many people unable to open Encrypted documents because they cannot remember their own passwords. Looking at countless Office password cracking software on the Internet, we can see that there are not a few of them.
Among the many Office Password cracking software, the author prefers Advanced Office Password Recovery (AOPR,: http://www.onlinedown.net/soft/37776.htm), because it is not only very simple operation, files that support cracking include almost all Office components, including Word, Excel, Access database, PowerPoint, Outlook, Outlook VBA macro files, and OneNote.
The author uses the full green version of AOPR, which can be directly used after decompression, but the first time it was run, it was an English interface. Converting to a Chinese menu is easy. Click the "Language" menu and select "Chinese ". Like all password cracking software, AOPR can also be divided into brute force cracking and dictionary cracking. For the Access password, AOPR can directly use its vulnerability to crack the password. However, for other components, it can only be cracked by brute force cracking or plug-in definition dictionary cracking. Fortunately: AOPR can crack general-strength passwords very quickly!
Open AOPR and click the "benchmark" tab. Two "computing" buttons are displayed to test the brute-force password cracking for Office 97/2000 and Office XP respectively. Click the "Dictionary" tab and use the "select dictionary file" button to select a dictionary file for cracking. You can also use the dictionary file that comes with AOPR to crack it.
A dictionary file is a combination of letters, numbers, or special characters generated according to certain rules. You can use specialized dictionary generation software to create your own data. The advantage of using dictionary files for password cracking is that it is fast, but the disadvantage is that the dictionary files cannot be cracked if they do not contain elements in the password. Generally, password files contain meaningful character combinations, such as birthdate, birthdate, and name pinyin. We do not recommend that you use the default dictionary. you can create your own password files and try to recall some of the content in the password, add it to the dictionary, which will multiply the cracking time!
Click the "brute force" tab to set the password length and characters. You can set to contain only letters, numbers, and all characters. After all the settings are complete, you can start cracking. Click the "Recover" tab to select the cracking method. The default value is "Mask-based brute-force cracking ". I suggest selecting "dictionary cracking" first. If the dictionary cracking does not retrieve the password, try another method. Click Open file to open the file to be cracked. The cracking speed depends on the difficulty of the password program. A prompt is displayed after the password is cracked.
Brute-force cracking unordered combinations of characters selected by the user, and each string obtained by the combination is used as a simulated Password Input to the software for verification. It can be seen that the correct choice of password containing characters is also an effective way to increase the speed of brute-force cracking, minimizing the span of the password length and the range of element types. This is very important for brute-force cracking, for example, if you choose a password with a minimum length of 5 and a maximum of 6, the cracking time is much smaller than the password length is the minimum length of 5 and a maximum of 7, of course, if possible, try to reduce the maximum number of digits of the password online, the increase in a single high level of crack time is geometric.
Of course, if you are cracking a WORD or EXCEL file, there is no need to be so troublesome. As long as you use the Office Password Remover, the entire cracking process will be completed within half a minute, supports the most common Word and Excel Encryption Files. The following uses Office 2003 as an example.
Run Office Password Remover. After opening the encrypted file, you will find a "Remove Password" button at the bottom of the main interface. At this time, you must first confirm that the computer is connected to the network. Click this button to crack the attack. The attack can be completed in more than 10 seconds.
4. WinRAR Password
WinRAR password is widely used and involves many password cracking tools. But frankly speaking, there is no particularly effective method for cracking WinRAR passwords, only brute-force cracking has a glimmer of hope. However, if your password is relatively simple or relatively "mentally retarded", the attack is still not a problem. Unfortunately, the passwords set by most people are relatively simple & relatively "mentally retarded ". For WinRAR passwords, "Advanced RAR Password Recovery" should be regarded as a professional cracking tool. The software is very fast to decrypt and can unlock up to 128-bit passwords after registration. It provides an estimate of the time required to calculate the password, and can interrupt the calculation and resume the previous calculation.
The usage of Advanced RAR Password Recovery (ARPR) is similar to that of AOPR. First, select the file to be cracked. Select the brute force mask or dictionary cracking mode. Of course, if we don't have much information, we can first select brute-force cracking, then select the length and range of the password, and click Start cracking.
Page 1: secure encryption
2. encryption is guaranteed
In the face of all kinds of cracking, we should not panic. We have the opportunity to provide deeper protection for the above methods. For example, the system password can be verified by using a USB flash drive.
1. "Boot" with a USB flash drive"
Many manufacturers have launched some products similar to computer locks, among which we have the most commonly used flash disks. Before starting the computer, we must insert it into the USB interface. Otherwise, the computer will automatically shut down when Windows is started, and the corresponding prompt will be displayed, it is indeed a good choice for users who don't want others to do anything about their computers. Currently, many flash disks have the computer lock function. The main function of the Computer lock is to prevent unauthorized use of your computer by others, and you can set the lock time of your computer and use it as the key for computer boot. It gives you peace of mind to use your computer without worrying about Data leaks.
First, create a file on the flash drive, such as fengyu.txt. The file name and extension can be modified at will. This file name and extension must be remembered. Otherwise, once the file is deleted by mistake, you have to reinstall the system to start the system! If you forget to include a flash drive or accidentally delete this file, you can use another person's flash drive to re-create this file and start the file. Create a notebook on the desktop, and enter: if not exist g: fengyu.txt shutdown-s-t-c "the host is not there, please do not use it ", select "file"> "Save as" in notepad, select "all files" in the SAVE type, and the file name is "logon. bat ", so that a script login file is ready.
In this script, g indicates the drive letter of the flash disk.