How to know the password of a file

Excel password There are several tools on the Internet, which allow you to find a secret password, or as we will call you today: The password Of a file, I do not intend with this post to promote malice; Rather explain the risk that exists to believe that all our data is protected simply behind the name of a fourth-grade love of the school.

In this case I will show the example of LasBit Corp, That if someone one day requires it because they forgot the name of which girlfriend used to protect their Excel file, or a malicious employee left behind a data set with malicious intent, here is an exit.

1. Bad password

It is clear that in this life we ​​must use more than one password, for security; It is not possible to use the same to access a forum just to make comments, to enter our email account, Facebook or credit card. And this is what makes us lose our heads because sooner or later we can get confused.

The safest passwords are those that have at least 9 digits, and that are not exact dictionary words, preferably containing numbers and if possible at least one upper case. This, because the principles that programs follow to break a password are based on combinations of characters, the more they are, the slower it will be. It is not recommended to use other types of codes, such as accented words or symbols because if one day we find a keyboard whose character table is broken ... the rush could have a flavor of Chubby atoll.

2. Let's look at an example

This is the case, from an Excel file, that one of my technicians did to teach the use of the cadastral file. I have his permission, because he made me a challenge if he found a way to break the password, so here we go:

As an Excel file, all you need is ExcelPassword and know the right way:

Excel-password

The chart shows the different routes:

  • If all you want is to break the password of locked cells, but without having the file protected, there is an option called fake allowing Reset it Immediately without the program looking for the name.
  • Another option is if you have an Excel file but 2003 versions, the Brute Force Attack I would find it in a couple of minutes. Although those files also had the option of encryption, if they had a long and complex password does not apply.
  • And then there's the alternative of 2007 files, in which Office further complicated the way of encryption (AES 128 encryption), With which the work becomes slow to the extent that the password is long and complex.

Excel password

Following the wizzard, you can give some characteristics, such as the language in which you are expected to search for words, the maximum number of characters, initial and final word, if you want to consider capital letters or codes ... for each option shows the amount of time It can take the search from a couple of minutes to many days.

Knowing the technician, who could have placed words only in Spanish, and that according to calculation can be less than six characters, here I go.Excel password

Ready:

23 seconds without capitals

It must be the name of a school bride or the nickname of someone tucked into a closet. Hehe

It was so fast that it did not cost me to get the printscreen. The bad thing is that I did not negotiate a bet, just a pinch challenge.

To test my theory, I used the same password for your Yahoo account, and ups !, it was the same although I warned you right now because I do not have any bad intentions with a technician for whose effort I have had many successes.

It is also possible that many are having chills at this time, and if they do not have them yet, check the list of passwords that can be found with the software LastBit.

3. What type of password can Break LastBit

It will not be the perfect world, but see that there are modules that can be purchased separately according to need: Among these are:

Office Documents

  • Excel
  • Word
  • Access
  • Power point
  • Pocket Excel
  • Back up (MS Backup)
  • Outlook
  • Project
  • Windows
  • VBA
  • SQL
  • OneNote

Internet Programs

  • Internet Explorer (Content Advisor)
  • Internet Explorer (Autocomplete data)
  • FireFox
  • FTP
  • ICQ
  • Mail (POP3) stored on the desktop
  • Skype
  • Yahoo Messenger
  • MSN

Other files or programs

  • PDF
  • Act! (From Symantec)
  • QuickBooks
  • Quicken
  • Schedule
  • SHA-1 (Secure Hash Algorithm)
  • Zip
  • MD4 and MD5 Algorithm

I do not doubt that this type of applications can be a solution to a business problem, as I mentioned at the beginning. But I have serious doubts if in bad hands it can be harmless.

Worried?

Leave an answer

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.