2

I created an encrypted but forgot the password. When I attempted a pattern based brute force it said it had over a 100 trillion passwords to check. And to my knowledge that could take a few years. Based on this it may be possible to use a padding oracle attack. That being said, how would I go about doing a "padding oracle attack"? I could not find anything on google.

Timberwolf
  • 121
  • 2

2 Answers2

7

A padding oracle attack is not helpful in cracking a 7zip archive. In a padding oracle attack the attacker must be able to decrypt arbitrary ciphertext, and the target must return a signal notifying the attacker that the padding of the arbitrary ciphertext is correct or not.

In the case of a 7zip archive where you do not know the password, you cannot decrypt the archive, so there is no way of knowing, if the padding is valid to begin with.

TildalWave
  • 10,801
  • 11
  • 45
  • 84
rook
  • 46,916
  • 10
  • 92
  • 181
4

As @Rook says a padding oracle attack isn't appropriate to your circumstances, however some suggestions for you in retrieving your archive.

  • If you have common passwords or phrases create a dictionary of those and then run an attack based on modifications of those words
  • If you have any memory of the length of the password use that to constrain the attack
  • if this is sufficiently valuable to you, you could look at software which makes use of GPUs and/or multiple CPU cores to speed up the cracking process.

at the end of the day It'll largely depend on how much you can cut down the search space and how much power you can throw at it.

Rory McCune
  • 60,923
  • 14
  • 136
  • 217