Force Password Testing 7z

I made a typo in my password back in the days when 7-zip did not have a "confirm pwd" field. So now I have a protected pwd 7-zip file. I wrote some software to generate the most likely variants of my password (55 million) and saved them in a file of 25 thousand. Now I try them, one by one. I can do about 25k pwd in an hour using the unar command-line tool on a Macbook.

It works, but it will still take a pleasant 100 days (24/7) to go through all 55 million players. Now I would like to know if there is a library (C # mono / dotnet) that supports decoding of a 7z file protected by pwd?

Any other suggestions for fixing my problem are also welcome.

+6
source share
1 answer

To accelerate brute force, study using CUDA or OpenCL. They will allow you to use the host's GPU to perform your processing and will produce results much faster.

25K passwords per hour are pretty low - when hash tracking (for example), a good GPU tool, can hit 9,500 million passwords per minute on a mid-range GPU.

While hitting this piece is unlikely when trying to beat 7z, you can definitely see an increase in speed.

In addition, the better the PC, the better the result. In many cases, Linux boxing is your best bet. If you can use a cluster of computers, all the better.

+1
source

All Articles