How to Install and Uninstall bruteforce-salted-openssl Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: December 23,2024
1. Install "bruteforce-salted-openssl" package
Please follow the step by step instructions below to install bruteforce-salted-openssl on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
bruteforce-salted-openssl
Copied
2. Uninstall "bruteforce-salted-openssl" package
This tutorial shows how to uninstall bruteforce-salted-openssl on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
bruteforce-salted-openssl
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the bruteforce-salted-openssl package on Ubuntu 20.10 (Groovy Gorilla)
Package: bruteforce-salted-openssl
Architecture: amd64
Version: 1.4.2-3
Priority: optional
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 57
Depends: libc6 (>= 2.29), libssl1.1 (>= 1.1.0)
Filename: pool/universe/b/bruteforce-salted-openssl/bruteforce-salted-openssl_1.4.2-3_amd64.deb
Size: 19800
MD5sum: dc7e0c1a589fee5a4e689a5650e6e63c
SHA1: 4353c27dfe0f1aed9eb6e71e6b7208348b439387
SHA256: 985aff88a318eeca9fe5ea48493a830510e88cb3b232b7e80531ef05aa3df340
SHA512: c8cce16cb922204cc6beaf921cca847f400b79ae3d0f1a4dcb0a63d7ae0a1e8fbd99dcab6b4a2a72a26efe233208cf629ef72883ae0bb6f4209a25abbe1780c4
Homepage: https://github.com/glv2/bruteforce-salted-openssl
Description-en: try to find the passphrase for files encrypted with OpenSSL
bruteforce-salted-openssl try to find the passphrase or password of a file
that was encrypted with the openssl command. It can be used in two ways:
.
- Try all possible passwords given a charset.
- Try all passwords in a file (dictionary).
.
bruteforce-salted-openssl have the following features:
.
- You can specify the number of threads to use when cracking a file.
- The program should be able to use all the digests and symmetric ciphers
available with the OpenSSL libraries installed on your system.
- Sending a USR1 signal to a running bruteforce-salted-openssl process
makes it print progress and continue.
- There are an exhaustive mode and a dictionary mode.
.
In the exhaustive mode the program tries to decrypt the file by trying all
possible passwords. It is especially useful if you know something about the
password (i.e. you forgot a part of your password but still remember most of
it). Finding the password of the file without knowing anything about it would
take way too much time (unless the password is really short and/or weak).
There are some command line options to specify:
.
- The minimum password length to try.
- The maximum password length to try.
- The beginning of the password.
- The end of the password.
- The character set to use (among the characters of the current locale).
.
In dictionary mode the program tries to decrypt the file by trying all the
passwords contained in a file. The file must have one password per line.
.
This package is useful for security, pentests and forensics investigations.
Description-md5: d453ce277a2d253415556498c2d9246d
Architecture: amd64
Version: 1.4.2-3
Priority: optional
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 57
Depends: libc6 (>= 2.29), libssl1.1 (>= 1.1.0)
Filename: pool/universe/b/bruteforce-salted-openssl/bruteforce-salted-openssl_1.4.2-3_amd64.deb
Size: 19800
MD5sum: dc7e0c1a589fee5a4e689a5650e6e63c
SHA1: 4353c27dfe0f1aed9eb6e71e6b7208348b439387
SHA256: 985aff88a318eeca9fe5ea48493a830510e88cb3b232b7e80531ef05aa3df340
SHA512: c8cce16cb922204cc6beaf921cca847f400b79ae3d0f1a4dcb0a63d7ae0a1e8fbd99dcab6b4a2a72a26efe233208cf629ef72883ae0bb6f4209a25abbe1780c4
Homepage: https://github.com/glv2/bruteforce-salted-openssl
Description-en: try to find the passphrase for files encrypted with OpenSSL
bruteforce-salted-openssl try to find the passphrase or password of a file
that was encrypted with the openssl command. It can be used in two ways:
.
- Try all possible passwords given a charset.
- Try all passwords in a file (dictionary).
.
bruteforce-salted-openssl have the following features:
.
- You can specify the number of threads to use when cracking a file.
- The program should be able to use all the digests and symmetric ciphers
available with the OpenSSL libraries installed on your system.
- Sending a USR1 signal to a running bruteforce-salted-openssl process
makes it print progress and continue.
- There are an exhaustive mode and a dictionary mode.
.
In the exhaustive mode the program tries to decrypt the file by trying all
possible passwords. It is especially useful if you know something about the
password (i.e. you forgot a part of your password but still remember most of
it). Finding the password of the file without knowing anything about it would
take way too much time (unless the password is really short and/or weak).
There are some command line options to specify:
.
- The minimum password length to try.
- The maximum password length to try.
- The beginning of the password.
- The end of the password.
- The character set to use (among the characters of the current locale).
.
In dictionary mode the program tries to decrypt the file by trying all the
passwords contained in a file. The file must have one password per line.
.
This package is useful for security, pentests and forensics investigations.
Description-md5: d453ce277a2d253415556498c2d9246d