Welcome to Incels.is - Involuntary Celibate Forum

Welcome! This is a forum for involuntary celibates: people who lack a significant other. Are you lonely and wish you had someone in your life? You're not alone! Join our forum and talk to people just like you.

Experiment Nerds and haX0rs gtfih

svgmn1

svgmn1

Fat link cult
★★★★★
Joined
Sep 3, 2021
Posts
12,962
does anyone here know a good genuine tool for cracking into an encrypted .rar? can't remember the pass or anything remotely close to the pass, I used a hash crack tool and this shit froze my laptop it just used all the resources at once, I'm sure there's a better way.....
 
Unfortunately I don't but have a bump. I hope some other brocel can help you regain access to your files.
 
another hash tool, I hoped there was some other method in the last decade
:cryfeels:

I guess I'll have to brute force this thing and let it run as long as it can
If anyone can pierce the AES-256 without brute force, they'll be visited by the NSA the next day and probably the SCS the day after.

I'm sorry brocel, but whatever data you had in there is practically lost to the void.
 
does anyone here know a good genuine tool for cracking into an encrypted .rar? can't remember the pass or anything remotely close to the pass, I used a hash crack tool and this shit froze my laptop it just used all the resources at once, I'm sure there's a better way.....
Nope, you can do dictionaries attacks. That might be faster or use a quantum computer.
 
wishmaster.exe
 
another hash tool, I hoped there was some other method in the last decade
:cryfeels:

I guess I'll have to brute force this thing and let it run as long as it can
Get a powerful computer and let it run for a few years, that should give you a chance to crack it, especially if you have a few hints on the password.

If anyone can pierce the AES-256 without brute force, they'll be visited by the NSA the next day and probably the SCS the day after.
They routinely break encryption without brute force (using side-channel and dictionary attacks, for instance). Moreover, basically all available tools on the market have backdoors and implementation bugs that make the encryption much weaker than the theoretical proposal.
 
They routinely break encryption without brute force (using side-channel and dictionary attacks, for instance). Moreover, basically all available tools on the market have backdoors and implementation bugs that make the encryption much weaker than the theoretical proposal.
My guess is that the reason they don't use them is cause the developers might patch the issues if it ever does, at least with anything Open Source. I remember that the NSA had a backdoor in Windows that they had but never used because they saved it for when mass scale cyberattacks occur.
 
My guess is that the reason they don't use them is cause the developers might patch the issues if it ever does, at least with anything Open Source. I remember that the NSA had a backdoor in Windows that they had but never used because they saved it for when mass scale cyberattacks occur.
Every single executable freely available has backdoors in it. Especially open source applications.

You can look at your code however long you like, the issue is not with the code, the issue is how the hardware runs it. Your code may well be "perfect" to the last assembler instruction but the CPUs don't ever run it the way you intend it to, they do their own thing, scheduling instructions, caching memory etc. in biased ways thay allow side-channel attacks.
 
Every single executable freely available has backdoors in it. Especially open source applications.

You can look at your code however long you like, the issue is not with the code, the issue is how the hardware runs it. Your code may well be "perfect" to the last assembler instruction but the CPUs don't ever run it the way you intend it to, they do their own thing, scheduling instructions, caching memory etc. in biased ways thay allow side-channel attacks.
It's so Over
 
They routinely break encryption without brute force (using side-channel and dictionary attacks, for instance). Moreover, basically all available tools on the market have backdoors and implementation bugs that make the encryption much weaker than the theoretical proposal.
Yes, they do, but I wasn't suggesting brute force.

Sorry, I misread you.
 
Last edited:
Yes, they do, but I wasn't implying brute force.
you stand correct, a sidenote on that topic I believe rijindael block has been fully broken by big brother even at higher key sizes, and to this day I believe two fish and other ciphers were deliberately excluded in the selection process for the security standard since they were too op and it had little or nothing to do with performance.
 
you stand correct, a sidenote on that topic I believe rijindael block has been fully broken by big brother even at higher key sizes, and to this day I believe two fish and other ciphers were deliberately excluded in the selection process for the security standard since they were too op and it had little or nothing to do with performance.
I think so too. The NSA isn't going to come out and honestly admit, "yup, this publicly available tool is uncrackable even by us." They're a fucking spy agency, after all. They have to be deceptive to mislead enemy states and keep their advantage hidden.
 

Similar threads

hghcel
Replies
27
Views
2K
hghcel
hghcel
WorthlessSlavicShit
Replies
56
Views
4K
Skoga
Skoga
L
Replies
9
Views
402
ilieknothing
ilieknothing
femcelbreedingnig
Replies
8
Views
726
femcelbreedingnig
femcelbreedingnig

Users who are viewing this thread

shape1
shape2
shape3
shape4
shape5
shape6
Back
Top