Viivo to hashcat
#4
I'm not aware of any such tool. I didn't even hear about .viivo files before.

There are for sure multiple pages that talk about PBKDF2-HMAC-SHA1 for the key derivation, see https://fileinfo.com/extension/viivo , https://web.archive.org/web/201911301706...rity-works


I don't think it's an open source tool and also on github you kind of find no cracking tool or other tool (maybe because it was already deprecated years ago, in 2017).

Without the algorithm details and file format details and key derivation details etc.. you can't do much.

What you could do is if you know the password is probably within a dictionary file or similar... write a simple script that just automates the decryption by automatically trying to open the file repeatedly with the different passwords from a password list: something like a AutoHotkey script or similar (you could also do it with a python script, for instance, but my guess is that AutoHotkey is the easiest one to get started, because you can simulate all the clicks and "typing" etc).
Of course this is not an ideal solution and won't work if the password is not present within a dictionary file or is really random etc...
without the exact algorithm details and code that shows how to decrypt and verify the data, it's not possible to implement anything here.

I would recommend that you first try to understand how feasible (and important) this is and how much you know about the password etc. Form the tools that are available on the internet, it doesn't look quite widely used (not even in the past ?), nor does it seem that there is any alternative software that can deal with those files (maybe exactly because it's proprietary format and without any open source code)
Reply


Messages In This Thread
Viivo to hashcat - by Sondero - 06-25-2020, 08:29 PM
RE: Viivo to hashcat - by philsmd - 06-25-2020, 08:35 PM
RE: Viivo to hashcat - by Sondero - 06-25-2020, 08:42 PM
RE: Viivo to hashcat - by philsmd - 06-25-2020, 10:23 PM