bruteforce-salted-openssl(1) | bruteforce files encrypted with OpenSSL | bruteforce-salted-openssl(1) |
bruteforce-salted-openssl - try to find the passphrase for files encrypted with OpenSSL
bruteforce-salted-openssl [options] <filename>
bruteforce-salted-openssl tries to find the passphrase or password of a file that was encrypted with the openssl command. It can be used in two ways:
bruteforce-salted-openssl has the following features:
In the exhaustive mode the program tries to decrypt the file by trying all possible passwords. It is especially useful if you know something about the password (i.e. you forgot a part of your password but still remember most of it). Finding the password of the file without knowing anything about it would take way too much time (unless the password is really short and/or weak). There are some command line options to specify:
In dictionary mode the program tries to decrypt the file by trying all the passwords contained in a file. The file must have one password per line.
Note: Sending a USR1 signal to a running bruteforce-salted-openssl process makes it print progress info to standard error and continue.
The program considers decrypted data as correct if it is mainly composed of printable ASCII characters (at least 90%). If the file you want to decrypt doesn't contain plain text, you will have to either use the -M option, or modify the 'valid_data' function in the source code to match your needs.
If the file you want to decrypt is big, you should use the -N option on a truncated version of the file (to avoid decrypting the whole file with each password).
Try to find the password of an aes256 encrypted file using 4 threads, trying only passwords with 5 characters:
Try to find the password of a des3 encrypted file using 8 threads, trying only passwords with 9 to 11 characters, beginning with "AbCD", ending with "Ef", and containing only letters:
$ bruteforce-salted-openssl -t 4 -l 5 -m 5 -c aes256 encrypted.file
Try to find the password of an aes256 encrypted file using 6 threads, trying the passwords contained in a dictionary file:
$ bruteforce-salted-openssl -t 8 -l 9 -m 11 -c des3 -b "AbCD" -e "Ef" -s "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" encrypted.file
Print progress info every 30 seconds:
$ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 encrypted-file
Try to find the password of a des3 encrypted gzip file using 8 threads:
$ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 -v 30 encrypted-file
Save/restore state between sessions:
$ bruteforce-salted-openssl -t 8 -v 5 -c des3 -m 9 -s "0123456789" -M "$(echo -ne '\x1f\x8b')" file.tar.gz.des3
Show the list of available algorithms:
$ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 -w state.txt encrypted-file
(Let the program run for a few minutes and stop it)
$ bruteforce-salted-openssl -t 6 -c aes256 -w state.txt encrypted-file
If the program finds a candidate password 'pwd', you can decrypt the data using the 'openssl' command:
$ bruteforce-salted-openssl -a
$ openssl enc -d -aes256 -salt -in encrypted.file -out decrypted.file -k pwd
bruteforce-salted-openssl was written by Guillaume LE VAILLANT. For contact, use the email <glv@posteo.net> or go to https://github.com/glv2/bruteforce-salted-openssl.
This manual page was written by Joao Eriberto Mota Filho <eriberto@debian.org> for the Debian project (but may be used by others).
May 2019 | bruteforced-salted-openssl-1.4.2 |