01-21-2024, 07:20 PM
Sounds very similiar concept to how microsoft documents were encrypted. This software is well aged, just a quick skim thru and the bruteforce FAQ shows using a pentium 4, haha.
Eitherway, it might be similar in attacking the RC4 key rather than the AES which is how people got access to their microsoft documents. How to go about that would need someone else to chime in and provide some assistance.
This post might have some helpful information.
https://hashcat.net/forum/thread-3665.html
Quote:The results of Brute Force attack calculations using Pentium 4, 1.6 GHz, 512 cache:
Eitherway, it might be similar in attacking the RC4 key rather than the AES which is how people got access to their microsoft documents. How to go about that would need someone else to chime in and provide some assistance.
This post might have some helpful information.
https://hashcat.net/forum/thread-3665.html