After cracking the “easy” PDF of John’s challenge, I’m cracking the “tough” PDF (harder_encryption).
Using the same steps as for the “easy” PDF, I confirm the PDF is encrypted with a user password using 40-bit encryption, and I extract the hash.
Since the password is a long random password, a brute-force attack on the password like I did in the first part will take too long. That’s why I’m going to perform a brute-force attack on the key: using 40-bit encryption means that the key is just 5 bytes long, and that will take about 2 hours on my machine. The key is derived from the password.
I’m using hashcat again, but this time with hash mode 10410 in stead of 10400.
This is the command I’m using:
I’m using the following options:–potfile-path=harder_encryption.pot : I prefer using a dedicated pot file, but this is optional -m 10410 : this hash mode is suitable to crack the key used for 40-bit PDF encryption -a 3 : I perform a brute force attack (since it’s a key, not a password) -w 3 : I’m using a workload profile that is supposed to speed up cracking on my machine ?b?b?b?b?b : I’m providing a mask for 5 bytes (I want to brute-force keys that are 40 bits long, i.e. 5 bytes)
And here is the result:
The recovered key is 27ce78c81a. I was lucky, it took about 15 minutes to recover this key (again, using GPU GeForce GTX 980M, 2048/8192 MB allocatable, 12MCU). Checking the complete keyspace whould take a bit more than 2 hours.
Now, how can we decrypt a PDF with the key (in stead of the password)? I’ll explain that in the next blog post.
Want a hint? Take a look at my Tweet!