Provided by: bruteforce-salted-openssl_1.4.2-4_amd64 bug

NAME

       bruteforce-salted-openssl - try to find the passphrase for files encrypted with OpenSSL

SYNOPSIS

       bruteforce-salted-openssl [options] <filename>

DESCRIPTION

       bruteforce-salted-openssl  tries  to  find  the  passphrase or password of a file that was
       encrypted with the openssl command. It can be used in two ways:

              •  Try all the possible passwords given a charset.

              •  Try all the passwords in a file (dictionary).

       bruteforce-salted-openssl has the following features:

              •  You can specify the number of threads to use when cracking a file.

              •  The program should be  able  to  use  all  the  digests  and  symmetric  ciphers
                 available with the OpenSSL libraries installed on your system.

              •  Sending  a  USR1  signal to a running bruteforce-salted-openssl process makes it
                 print progress and continue.

              •  There are an exhaustive mode and a dictionary mode.

       In the exhaustive mode the program tries to  decrypt  the  file  by  trying  all  possible
       passwords.  It  is  especially  useful  if you know something about the password (i.e. you
       forgot a part of your password but still remember most of it). Finding the password of the
       file  without  knowing anything about it would take way too much time (unless the password
       is really short and/or weak). There are some command line options to specify:

              •  The minimum password length to try.

              •  The maximum password length to try.

              •  The beginning of the password.

              •  The end of the password.

              •  The character set to use (among the characters of the current locale).

       In dictionary mode the program tries to decrypt the  file  by  trying  all  the  passwords
       contained in a file. The file must have one password per line.

OPTIONS

       -1     Stop the program after finding the first password candidate.

       -a     List the available cipher and digest algorithms.

       -B <file>
              Search  using  binary passwords (instead of character passwords).  Write candidates
              to <file>.

       -b <string>
              Beginning of the password. The default value is "".

       -c <cipher>
              Cipher for decryption. The default value is aes-256-cbc.

       -d <digest>
              Digest for key and initialization vector generation. Default: md5.

       -e <string>
              End of the password. Default: "".

       -f <file>
              Read the passwords from a file instead of generating them.

       -h     Show help and quit.

       -L <n> Limit the maximum number of tested passwords to <n>.

       -l <length>
              Minimum password length (beginning and end included). Default: 1.

       -M <string>
              Consider the decryption as successful when the data starts with <string>.   Without
              this  option,  the  decryption  is  considered as successful when the data contains
              mostly printable ASCII characters (at least 90%).

       -m <length>
              Maximum password length (beginning and end included). Default: 8.

       -N     Ignore decryption errors (similar to openssl -nopad).

       -n     Ignore salt (similar to openssl -nosalt).

       -p <n> Preview and check the first <n> decrypted bytes for the magic string.  If the magic
              string is present, try decrypting the rest of the data.  Default: 1024.

       -s <string>
              Password          character          set.          Default         value         is
              "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"

       -t <n> Number of threads to use. Default: 1.

       -v <n> Print progress info every n seconds.

       -w <file>
              Restore the state of a previous session if the file exists, then write the state to
              the file regularly (~ every minute).

       Note:  Sending a USR1 signal to a running bruteforce-salted-openssl process makes it print
       progress info to standard error and continue.

LIMITATIONS

       The program considers decrypted data as correct if it  is  mainly  composed  of  printable
       ASCII  characters  (at  least  90%). If the file you want to decrypt doesn't contain plain
       text, you will have to either use the -M option, or modify the  'valid_data'  function  in
       the source code to match your needs.

       If  the  file  you  want  to  decrypt  is big, you should use the -N option on a truncated
       version of the file (to avoid decrypting the whole file with each password).

EXAMPLES

       Try to find the password of  an  aes256  encrypted  file  using  4  threads,  trying  only
       passwords with 5 characters:

           $ bruteforce-salted-openssl -t 4 -l 5 -m 5 -c aes256 encrypted.file

       Try  to  find the password of a des3 encrypted file using 8 threads, trying only passwords
       with 9 to 11 characters, beginning with "AbCD", ending  with  "Ef",  and  containing  only
       letters:

           $ bruteforce-salted-openssl -t 8 -l 9 -m 11 -c des3 -b "AbCD" -e "Ef" -s "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" encrypted.file

       Try to find the password of an aes256 encrypted file using 6 threads, trying the passwords
       contained in a dictionary file:

           $ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 encrypted-file

       Print progress info every 30 seconds:

           $ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 -v 30 encrypted-file

       Try to find the password of a des3 encrypted gzip file using 8 threads:

           $ bruteforce-salted-openssl -t 8 -v 5 -c des3 -m 9 -s "0123456789" -M "$(echo -ne '\x1f\x8b')" file.tar.gz.des3

       Save/restore state between sessions:

           $ bruteforce-salted-openssl -t 6 -f dictionary.txt -c aes256 -w state.txt encrypted-file
             (Let the program run for a few minutes and stop it)
           $ bruteforce-salted-openssl -t 6 -c aes256 -w state.txt encrypted-file

       Show the list of available algorithms:

           $ bruteforce-salted-openssl -a

       If the program finds a candidate password 'pwd',  you  can  decrypt  the  data  using  the
       'openssl' command:

           $ openssl enc -d -aes256 -salt -in encrypted.file -out decrypted.file -k pwd

AUTHOR

       bruteforce-salted-openssl was written by Guillaume LE VAILLANT. For contact, use the email
       <glv@posteo.net> or go to https://github.com/glv2/bruteforce-salted-openssl.

       This manual page was written by Joao Eriberto Mota  Filho  <eriberto@debian.org>  for  the
       Debian project (but may be used by others).