A classic: lost .ple password. |
Author: |
Message: |
ItsLost
New Member
Posts: 6
Joined: May 2007
|
O.P. A classic: lost .ple password.
I already found there's no other way to retrieve it but to crack my head about it.
But, a little extra info could help me:
*is the password case sensitive?
*can somehow be revealed how many characters were used for it?
Thanks already!
This post was edited on 05-23-2007 at 07:22 AM by ItsLost.
|
|
05-23-2007 07:20 AM |
|
|
MattyRid
Veteran Member
Red Bull Racing Australia
Posts: 1321 Reputation: 21
– / /
Joined: Jan 2006
Status: Away
|
RE: A classic: lost .ple password.
Not that I'm aware of, and that goes for the 2 of them. That is unless there is something hidden
Red Bull Racing Australia - Triple Eight Race Engineering - Holden
|
|
05-23-2007 07:23 AM |
|
|
Ezra
Veteran Member
Forgiveness is between them and God
Posts: 1960 Reputation: 31
37 / /
Joined: Mar 2003
|
RE: A classic: lost .ple password.
IIRC the password itself isn't stored anywhere, plus! just tries to decrypt the file with the given password and check the first couple of bytes for a special string that should be readable then. If it's not it will error that the wrong key was used.
|
|
05-23-2007 08:24 AM |
|
|
ItsLost
New Member
Posts: 6
Joined: May 2007
|
O.P. RE: A classic: lost .ple password.
quote: Originally posted by Ezra
IIRC the password itself isn't stored anywhere, plus! just tries to decrypt the file with the given password and check the first couple of bytes for a special string that should be readable then. If it's not it will error that the wrong key was used.
Indeed, but I found a thread indicating that the first lines of the encrypted file could contain a clue about the password. Not much, but maybe its length?
And then there's the question iif the password is case sensitive. If it isn't, that would already seriously decrease the different possibilities.
|
|
05-23-2007 08:37 AM |
|
|
Ezra
Veteran Member
Forgiveness is between them and God
Posts: 1960 Reputation: 31
37 / /
Joined: Mar 2003
|
RE: A classic: lost .ple password.
I'm guessing the thread you mean is Tool to encrypt or decrypt log files
There is indeed something said about a password check length, but I think this is the length of this string I meant that plus! compares to see if it's correct.
|
|
05-23-2007 09:23 AM |
|
|
CookieRevised
Elite Member
Posts: 15517 Reputation: 173
– / /
Joined: Jul 2003
Status: Away
|
RE: A classic: lost .ple password.
quote: Originally posted by ItsLost
Indeed, but I found a thread indicating that the first lines of the encrypted file could contain a clue about the password. Not much, but maybe its length?
Whoever claimed that is wrong. There are no clues what-so-ever in an encrypted log.
quote: Originally posted by Ezra
There is indeed something said about a password check length, but I think this is the length of this string I meant that plus! compares to see if it's correct.
indeed.
quote: Originally posted by ItsLost
And then there's the question iif the password is case sensitive.
All passwords are case sensitive.
This post was edited on 05-23-2007 at 09:36 AM by CookieRevised.
.-= A 'frrrrrrrituurrr' for Wacky =-.
|
|
05-23-2007 09:29 AM |
|
|
ItsLost
New Member
Posts: 6
Joined: May 2007
|
O.P. RE: A classic: lost .ple password.
quote: Originally posted by Ezra
I'm guessing the thread you mean is Tool to encrypt or decrypt log files
There is indeed something said about a password check length, but I think this is the length of this string I meant that plus! compares to see if it's correct.
Good guess.
It is indeed comparing something. And if it can do that, there must be stored something to compare with.
|
|
05-23-2007 09:34 AM |
|
|
Ezra
Veteran Member
Forgiveness is between them and God
Posts: 1960 Reputation: 31
37 / /
Joined: Mar 2003
|
RE: A classic: lost .ple password.
quote: Originally posted by ItsLost
It is indeed comparing something. And if it can do that, there must be stored something to compare with.
Yes, but this won't give you any clues to what the password is or how long it is.
It will tell you if you have the correct password AFTER decrypting the file with the right password.
This post was edited on 05-23-2007 at 09:37 AM by Ezra.
|
|
05-23-2007 09:36 AM |
|
|
CookieRevised
Elite Member
Posts: 15517 Reputation: 173
– / /
Joined: Jul 2003
Status: Away
|
RE: RE: A classic: lost .ple password.
quote: Originally posted by ItsLost
quote: Originally posted by Ezra
I'm guessing the thread you mean is Tool to encrypt or decrypt log files
There is indeed something said about a password check length, but I think this is the length of this string I meant that plus! compares to see if it's correct.
Good guess.
It is indeed comparing something. And if it can do that, there must be stored something to compare with.
I think you're confusing things though.
What is being compared is a special string, not a password! The string is like an encrypted mini-log and is decrypted using the password you provide to check if the password is correct. This is done so the entire, often very big, real log doesn't need to be decrypted in order to see if the password is correct or not.
Only if this mini-log is properly decrypted Plus! will start to decrypt the real log. If that mini-log isn't properly decrypted you get the error that the password was incorrect.
The 'length' talked about in that thread is the length of this mini-log, not the length of the password. In that thread this "mini-log" is called "encrypted password check string".
The password, nor any clues about it, aren't stored anywhere.
This post was edited on 05-23-2007 at 09:44 AM by CookieRevised.
.-= A 'frrrrrrrituurrr' for Wacky =-.
|
|
05-23-2007 09:41 AM |
|
|
ItsLost
New Member
Posts: 6
Joined: May 2007
|
O.P. RE: RE: RE: A classic: lost .ple password.
Thanks for the explanation, although it's bad news .
I'm totally not into encrypting. My idea/hope came from the 'analogy' of the key and the keyhole. The password is used to 'unlock(decipher)' the file like a key is used to unlock the lock. Looking at the keyhole gives some idea about the key as well.
Then, another strategy.
If I limited the amount of characters for the password to let's say 10, and taking into account 2*26 + 10 possible characters, I end up with 8.53E+17 possible combinations. Take that in combination with a tool like:
Indicates whether the password is valid for specified encrypted file in archive.
[C#]
public bool IsFilePasswordValid(string fileName, string password);
[VB.NET]
Public Function IsFilePasswordValid(ByVal fileName As String, ByVal password As String) As Boolean
Description
Use IsFilePasswordValid to determine whether the password is valid for specified file in archive.
The fileName parameter specifies file name being tested.
The password parameter is a password to check.
(found on http://www.componentace.com/help/fxc_guide/isfilepasswordvalid.htm)
Would a modern pc be up to that job, taking into account the password is only verified in that mini-log, as you described it?
quote: Originally posted by CookieRevised
I think you're confusing things though.
What is being compared is a special string, not a password! The string is like an encrypted mini-log and is decrypted using the password you provide to check if the password is correct. This is done so the entire, often very big, real log doesn't need to be decrypted in order to see if the password is correct or not.
Only if this mini-log is properly decrypted Plus! will start to decrypt the real log. If that mini-log isn't properly decrypted you get the error that the password was incorrect.
The 'length' talked about in that thread is the length of this mini-log, not the length of the password. In that thread this "mini-log" is called "encrypted password check string".
The password, nor any clues about it, aren't stored anywhere.
Moreover, another thought. Any new chat log is encrypted using the same password, without having to provide that password every time. That means Plus! is keeping it somewhere?
|
|
05-23-2007 10:36 AM |
|
|
Pages: (2):
« First
[ 1 ]
2
»
Last »
|
|