Crack GPG Password
Derek Broughton
news at pointerstop.ca
Wed Jun 11 19:35:00 UTC 2008
Bart Silverstrim wrote:
> Derek Broughton wrote:
>> Bart Silverstrim wrote:
>>
>>> Blaine Fleming wrote:
>>>> Bart Silverstrim wrote:
>>>>> You *can't* extract a part of a password like the OP is looking for.
>>>>> The algorithm used in creating the encrypted product doesn't look at
>>>>> your password as discrete chunks to be guessed like you see in the
>>>>> movies where you see, "Oh my @#$! He has the first three numbers
>>>>> already!" while you hear a crescendo of suspenseful music.
>>>>>
>>>> Again, the way I read it the OP wants to find out the missing part. If
>>>> I have a password of "password" but all I remember is "passwor" then I
>>>> can brute force the remaining bit.
>>> Oh my $@! How STUPID CAN YOU BE?! HOW DENSE?! Again, what I said
>>> was...oh, I see what you're saying.
>>
>> I think you missed a :-)
>
> Indeed ;-) But that would have stolen the thunder! C'mon...admit
> it...you had to reread that sentence just as you were about to let loose
> the dogs of war...
I'm afraid I only have the
dogs-of-complete-inactivity-except-when-we-see-a-squirrel.
>> Fairly easy, I guess if you actually have an unencrypted copy of
>> something that was crypted - then you run diff against the output of your
>> new decryption and the old data, but if you don't have such a file,
>> there's probably nothing as good as your own eyes for knowing when you
>> get it
>> right. Though, if some of your crypted data is in known formats (eg,
>> email) you just need to be able to look for strings that are part of the
>> protocol (like "Subject: ").
>
> Yeah, I was thinking you'd need a small dictionary of some sample texts
> or material to scan the result each time for a cursory "Is this it?"
> type hits rather than gobbledygook.
Right.
--
derek
More information about the ubuntu-users
mailing list