![]()
AES FILE DECRYPTION TOOL FREEFeel free to contribute to the project in any way. I'll get back to you with the newer benchmark numbers when I have them. Anyway I hope you all find this tool useful. But this whole journey has been an amazing learning experience for me allowing me to sharpen many skills and develop many new ones. I have a tendency towards longer passwords. ![]() So long passwords would be a long term commitment to try to crack unless you own Amazon or the like. At 8 characters with 4 cores a month isn't out of the question. I have some numbers from the original bash/crunch/xargs: At two character passwords I got about 35 passwords tried per second, at 3 character passwords I get about 12 passwords tried per second. I plan to have this program be one of those system benchmarks that everyone compares their computer by. ![]() So I can only imagine the performance gains from splitting the work across so many systems and system cores.īenchmarking is next for my project. You can rent an Amazon multi-core system for around 64 cores $3 to $5 an hour. ![]() I'm playing with the idea of divvying out the work to the cloud. This uses your CPU cores at 100% so you'll likely need to do this work on a secondary system. You can set the range of characters, character set, limit adjacent same characters, and start point. The commands are fairly straight forward and detailed in the help you get with -h. I also want to add GPU support for processing with ArrayFire but I first need to look into how feasible this is.Ībrute works well on Mac and Linux and is untested on Windows (it shouldn't take too long to try it out on Windows). AES FILE DECRYPTION TOOL CODEOver time I plan to write my own code for decrypting AES files and drop the need for the aescrypt executable. But the threading work is handled brilliantly (some one elses library) and at the moment I have Standard Out including progress. And the attempts for decrypting are all calls to the aescrypt command for now. I ended up rewriting most of the crunch tool into my own sequencer with my algorithm improvements to save CPU cycles. So yeah, I wanted to have something better. Not to mention a power outage had me lose a good chunk of progress. But this was a bit crude as I had to let it run many weeks and could only check the progress by peeking into data being passed through Linux pipes. AES FILE DECRYPTION TOOL HOW TONext I learned how to do the equivalent of multi-threading with only using Bash and xargs which will let you spin up parallel processes to run across all your cores. That didn't open the file for me but that code has already helped one other person open their encrypted file. On that thread I first developed a likely word list with shuffling sequences, ordering, and generating plenty of output to test against. I have answered my own question on the forum with many helpful ways I've tried to implement a solution to opening my AES encrypted files. I went from creating a detailed question, as I was unable to find the answers I was looking for, and got a few small tips pointing me towards the tool known as crunch. This led me to look for answers on Security/StackExchange. AES FILE DECRYPTION TOOL PASSWORDMy journey started with finding some of my old archived encrypted files and discovering I am unable to remember the password correctly. I so want the new AMD Thread-Ripper with all its cores. Also true for the longer a character set is to work with. I can say that with a finite amount of cores the workload goes up exponentially as the password length goes up. Now the computers I own only have 4 cores so I'm limited in the amount of processing power to get work loads done. I've spent a good portion of my development time discovering and implementing sequence algorithms to shave off as many wasted CPU cycles as I can and I feel pretty good about it. It has much of the same character sequencer support that the crunch tool does. Abrute is a Multi-threaded AES brute force file decryption tool. After 3 months of work I've released version 0.1 of Abrute.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |