How hard would it be to go about hacking into a drive protected by DCrypt where I 'know' the password?
Funny situation that you've probably heard dozens of times before:
I have a drive I put a password on a while ago. I -know- the password (lol). And yet, it doesn't work.
I'm not a coder of any kind, I don't know any programming languages. It's a windows 11 pc and the drive is external. The password was put on several years/versions ago.
What I'm mainly wondering is if a program could be made to 'brute force' within a specific set of parameters.
Specifically: Like I said, I know what the password should be. It's a long passphrase. So let's say for example that the password has a set of words, a set of numbers and a couple special characters. In a specific, set order.
I know what the order is supposed to be. The parameters I'm thinking of are- Varying upper and lower case for the words. Adding a character that maybe is part of the word, like (W for Virginia/WVirginia). Stuff like that. Varying the special character. The password is, let's say, 35 characters long.
I'm thinking if something like a brute force script that goes from, whatever, 33-35 characters, uses these known words and numbers, but varies some of the places where upper/lower case might matter, the special characters, etc. Maybe playing with the word order which should be set, but at this point who knows.
Either way I think I'm looking at what, maybe a hundred or so different variations? When the actual variation shouldn't be more than a dozen or so, but I've tried those dozen, so I'm expanding out.
How possible/impossible is this? How might one go about doing that?
Follow up question - is there any reason that a newer version of DCrypt would work with a drive encrypted with an older version? And the pc used would be different than the one trying to get in, if that makes a difference.
[link] [comments]
from hacking: security in practice https://ift.tt/iLMERm0
Comments
Post a Comment