Crack GPG Password

Bart Silverstrim bsilver at chrononomicon.com
Wed Jun 11 16:07:55 UTC 2008


Derek Broughton wrote:
> Bart Silverstrim wrote:
> 
>> Blaine Fleming wrote:
>>> Bart Silverstrim wrote:
>>>> You *can't* extract a part of a password like the OP is looking for. The
>>>> algorithm used in creating the encrypted product doesn't look at your
>>>> password as discrete chunks to be guessed like you see in the movies
>>>> where you see, "Oh my @#$! He has the first three numbers already!"
>>>> while you hear a crescendo of suspenseful music.
>>>>   
>>> Again, the way I read it the OP wants to find out the missing part.  If
>>> I have a password of "password" but all I remember is "passwor" then I
>>> can brute force the remaining bit.
>> Oh my $@! How STUPID CAN YOU BE?! HOW DENSE?! Again, what I said
>> was...oh, I see what you're saying.
> 
> I think you missed a :-)

Indeed ;-) But that would have stolen the thunder! C'mon...admit 
it...you had to reread that sentence just as you were about to let loose 
the dogs of war...

> Fairly easy, I guess if you actually have an unencrypted copy of something
> that was crypted - then you run diff against the output of your new
> decryption and the old data, but if you don't have such a file, there's
> probably nothing as good as your own eyes for knowing when you get it
> right.   Though, if some of your crypted data is in known formats (eg,
> email) you just need to be able to look for strings that are part of the
> protocol (like "Subject: ").

Yeah, I was thinking you'd need a small dictionary of some sample texts 
or material to scan the result each time for a cursory "Is this it?" 
type hits rather than gobbledygook.




More information about the ubuntu-users mailing list