Rainbow attack

<< Click to Display Table of Contents >>

Navigation:  Password Recovery Programs > Advanced Office Password Breaker > Working with AOPB >

Rainbow attack

With the Enterprise version of AOPB, you can speed up the decryption of supported Word documents and about 97% of supported Excel spreadsheets by enabling the Use pre-computed hash tables option. Press Browse and select the folder where the tables are located (the location is separately configured for Word and Excel). For Microsoft Word, the folder should contain the following subfolders/files:

0\t00_l17000.data

0\t00_l17000.index

1\t01_l17000.data

1\t01_l17000.index

2\t02_l17000.data

2\t02_l17000.index

3\t03_l17000.data

3\t03_l17000.index

4\t04_l17000.data

4\t04_l17000.index

5\t05_l17000.data

5\t05_l17000.index

missing.bin

 

For Microsoft Excel:

0x62\0\t00_l12500.data

0x62\0\t00_l12500.index

0x62\1\t01_l12500.data

0x62\1\t01_l12500.index

0x62\2\t02_l12500.data

0x62\2\t02_l12500.index

0x66\0\t00_l12500.data

0x66\0\t00_l12500.index

0x66\1\t01_l12500.data

0x66\1\t01_l12500.index

0x66\2\t02_l12500.data

0x66\2\t02_l12500.index

 

With hash tables on the hard drive, the attack may take 10 to 30 minutes to complete. If the tables are stored on a fast USB flash drive or an SSD drive, most attacks will complete in seconds, but may take up to 10-15 minutes.

Teh Use deep length analysis option helps control the way the Excel files are processed. In Excel, not every file contains predictable data required for this method of decryption, and some parameters must be guessed. In most cases, only one or two stages (up to several minutes each) are required to find the correct encryption keys, but there is a chance that the parameters have been selected incorrectly, and more stages will be needed with other combinations of parameters. The process may take an hour or two. This option determines what to do if the key has not been found during the first/default stages; select Yes to always perform further attacks with a different set of parameters; Always ask to make the choice only if the first stages fail; or No otherwise.

Please note that if the key is not found using pre-computed Excel tables, you can still decrypt the file by temporary disabling this option and performing the full key search.