so i have this text file that i have had on my computer for years, but i cant remember for the life of me what i set as the password.
i have tried all sorts of methods but i cant get it open any tips?
>>59426579
how do you even encrypt a text file?
>>59426583
Windows breifcase
>>59426583
ok update, a friend says it might be an ODT file, not sure what that is though
>>59426579
It's fucked. Just delete it and move on
>>59426612
i cannot.. the curiosity is drive me nuts is there no other way?
It's an open office text doc. The password was difficult enough that rockyou.txt can't crack it. I'm 99% sure it's fucked, but I'd like to unlock it.
>>59426668
shut up
>>59426671
no you
>>59426579
You know how to open a padlock properly?
Take a 5 meter long steel pipe and push it through it, I once almost took the whole door down with it.
>>59426583
Very carefully
>>59426708
Ill try to stick a long pipe though my harddrive, maybe it'll work. Thank you for your sage wisdom
>>59426579
Use the "shred" program. It's a program which bruteforces common passwords and variations on it, and will unlock the file 99% of the time.
It's as simple asshred myfile.txt.
>>59426579
Just find a bruteforcer program
Also make several backups of the file
>>59426775
Kek
>>59426775
It would save me the headache
Give the file back Jamal
>>59426785
A brute force at 10000 pw/s would take 90 days straight to check all passwords created with only numbers and letters of length 7. That's not including special characters. It's not viable.
>>59426785
Also, as previously stated, rockyou.txt doesn't have the password and that's a pretty sizeable dictionary.
>>59426860
>>59426668
>Download rockyou.txt
>None of my passwords appear in it
>>59426950
You can't deny that it's a lot of passwords though. That dictionary just has a lot of the "typical" stuff in it. But if your pass is even a little decent it doesn't appear.
>>59426966
I'm not OP. I was just checking my passwords out of curiosity.
I lot of my weaker, less important, passwords consist of made-up words and names of non-famous or fictional people.
Although for my "high quality" passwords, they're typically over 20 characters long.
>>59426989
That's pretty good honestly. I just have a few passwords that are moderately difficult. But in nowhere near twenty characters. I'm surprised you have the patience to type that in anytime you need to access whatever that pass protects.
>>59426775
Why is it that the ones who poorly attempt to troll in "clever" ways are always the most informed? Nothing would happen because you forgot to tell the program to even delete the file:
>Delete FILE(s) if --remove (-u) is specified. The default is not to remove the files because it is common to operate on device files like /dev/hda, and those files usually should not be removed. When operating on regular files, most people use the --remove option.
Same shit with the System32 and rm retards, those can't be done unless you explicitly disarm safety features that throw a lot of warnings. That stuff used to work in the 90s. How stupid are these trolls even?
hashcat
I think you can do variables, so if you sort of know what it is, it can speed things up.
if the password is short, just brute force it