07-03-2024, 01:27 PM
first run office2john.py or (exe) from John the Ripper suite on your file and see whether you can extract a hash from the file or not
if not, the used encryption is not (or not yet) supported and therefore not attackable
if not, the used encryption is not (or not yet) supported and therefore not attackable