Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Brute force 7z password testing [closed]

I've made a typo in my password back in the days when 7-zip didn't have a 'confirm pwd' field. So now I have a pwd-protected 7-zip file. I've writen some software to generate most likely typo variations of my password (55 million) and stored those in a file per 25k. Now I'm trying them out, one-by-one. I can do about 25k pwd's in an hour, using the unar commandline tool on a Macbook.

It works, but it will still take a nice 100 days (24/7) to go through all 55 mln pwds. Now I'd like to know, if there's some library (c# mono/dotnet) that supports decoding a 7z file that is pwd protected?

Any other suggestions on fixing my problem are also welcome.

like image 520
Papa.Coen Avatar asked Apr 17 '13 13:04

Papa.Coen


1 Answers

To speed up the brute force, look into using CUDA or OpenCL. These will let you utilise the GPU of the host machine to perform your processing, and will produce results much faster.

25K passwords per hour is quite low - when hash cracking (for example), a good tool using GPU will be able to hit 9500million passwords a minute on a mid-high end GPU.

Whilst hitting that figure is unlikely when trying to break 7z, you could definitely see a speed increase.

Also - the better the PC, the better the result. In many cases a Linux box is your best bet. If you can use a cluster of computers - all the better.

like image 126
DIXONJWDD Avatar answered Sep 19 '22 12:09

DIXONJWDD