Windows Password big battle III

Source: Internet
Author: User
Tags elcomsoft

Migroom [S. N.T]

2.3 common encrypted file cracking
With a silly smile, I was comforted by my heart: "My documents are encrypted, and no one of you can see my privacy ", when you think they are safe enough, unexpected things happen. Let's take a look at the charm of cracking!
Tool: As mentioned above, Passware. I will not introduce it here. First install it. Open the first installation interface, 2.32, next, we will keep "Next" on the "OK" Page. Here we should note that we will ask you to fill in the serial number in the last step. We can copy the prepared serial number into it, 2.33.

Nowadays, some people like to encrypt privacy first and then compress encryption. This is a bit of a joke, and their Word and password have raised questions? Can it be cracked? Now we have another RAR/ZIP compressed file. Isn't that difficult? Token ", 2.35, and they all have an encrypted Word document that is forbidden to be modified, 2.36. Let's start attacking them!

First, open the software. Here, we will take the love book. Zip for the first time to warm up. Let's see how fast it is. Open the Zip Key and set it up. Click Settings, 2.37, locate "Dictionary" and point the path to the Dictionary you want to use for cracking. 2.38. Generally, the Dictionary is selected by default and click OK.
 

Open the website recoverizer and choose the ultimate love book. Zip ", 2.39. When we just put the love book. Zip in it, I was surprised that the password had come out so quickly. After reading the report, I found that there were more than 0.7 million passwords tried every second, this speed is terrible, 2.40.
 

", I hope he will make me satisfied with the results. Just click the next step to change the rarcracking program, and then click "recover? ..rar", 2.41

When loading, I was even more surprised when something happened. After 1 minute 1 second cracking, I still didn't see the data display, and every data was beating back and forth, when the attack was completed, it took 4 minutes and 41 seconds. In addition, the number of passwords tried per second was only 5, 2.42. After this data is obtained, we can get such a result. The same password, but different compression methods also bring different difficulties to the hackers, this is why most people like rar compression, because it is more difficult to crack than zip.
 

After the above cracking, let's crack the Word password! Just now we can see that the Word has been restricted to modification permissions, and it is encrypted. The tool is also the Elcomsoft Advanced Password Recovery Studio 2005 described above. I will not introduce it much here. Next let's start the installation program to crack it. The first installation interface is 2.43.

After the software is successfully installed, the shortcut of the corresponding program is displayed. In the program on the Start Menu Bar, select "Start Menu -- program -- Elcomsoft -- Advanced Office Password Recovery plugin", and then click "2.44.



You will find that the password has come out when we open the document, 2.47, it looks complicated (~! @ # $ % ^ & * ()_11d.pdf, connect to US " .doc ", enter the password, 2.48, and check whether the content is clear at a glance, 2.49.


2.4 password setting skills

There are so many examples of "passwords" in the above, but how can I remember so many passwords on the network? How can I remember those passwords? Here I will teach you a few tips.

2.4.1 replacement of Characters
You may be familiar with the character replacement method. For example, if our password is bananaoo1, the replacement method is B @ n @ 00l. Replace a with @ to o with 0. In this way, you only need to remember the replaced characters.

2.4.2 poetry and Lyrics
When you like music and poetry every day, why didn't you think these are passwords? The only advantage of the poetry memory method is that the character segment is relatively long. For example, "if you want to cook for wine at dusk, you will have to get drunk. From then on, I had no intention of having a dream of Hui Zhou alone ." Use them as passwords like "yjhhzzj, zlmycsxc", and take the first letter of poetry and lyrics. Note that the "comma" and "Period" in the middle are better to be added. Do not enter them like this: "yujianghuanghunzhuzuijiu" can be used to find some rules in pinyin. In addition, you can also find some relatively biased poems. Do not look for the common ones that will be carried by kindergartens, qu Xiang Tian ge "of course, if you like the paper, you can also use the paper as a password! However, this may take a long time to practice.

Network security is always the opposite of attack and defense, regardless of cryptography, social engineering, psychology, or network security, to do a good job in network security, we need to mix these technologies and knowledge to make full use of them.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.