![]() ![]() If you are going to use a brute-force program, do not use a random program found on the internet.Try to recall the password if you want to decrypt the file.If the file just contains bookkeeping for a week, just start over and do not waste time on decrypting the file.The 32-byte password is derived from your password using PBKDF2 with 1024 iterations.Ī paper on decrypting ODF files is available here, these contain nice information to craft your own brute-forcer but are probably not suitable for the average user.Īs with most encryption products, password recovery is near impossible. My example encrypted spreadsheet contained the following interested parts: įrom that we can learn that LibreOffice uses a SHA256 hashing algorithm for checking data integrity, AES256 in CBC mode. Of course there exist some unencrypted metadata, one of them being As expected, the contents of the document are encrypted and indistinguishable from random bytes. ods files are just Zip files, I tried to encrypt the file and extracted the contents. This mailing list post also makes clear that the password is derived using PBKDF2 which means that brute-forcing will be much slower with a sufficient high iteration count. According to, it uses a 256-bits AES cipher. Since LibreOffice is open source, I'd start with looking up what kind of encryption it uses. Virus scanners do not find everything, so you still cannot trust the executable because ClamAV detects nothing. I would not use such a closed-source programs from random, untrusted sources as suggested. These programs often use brute-force or dictionary-based attacks. MiJyn suggested the use of password crackers for. ods file as root will still not allow you to retrieve the file contents because those are encrypted which is beyond the power of a root user. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |