Elcomsoft Co.Ltd. » Advanced Office Password Recovery

Customizing the Preliminary Attack

Top  Previous  Next

Every time you open a document in Advanced Office Password Recovery, the tool performs a preliminary attack if the "file open" password is set. This attack tries passwords recovered in the past (stored in the password cache), followed by the short dictionary attack and brute-force attacks.

 

The brute-force attack consists of two parts:

 

1. Digits and Latin characters

2. National characters depending on the Windows code page

 

You can set your own character sets and languages for Preliminary Attack using the "attacks.xml" file that is located in the directory where Advanced Office Password Recovery is installed.

 

The first section of this file is the language map:

 

<LanguageNameMap>

 <x0411>Japanese</x0411>

 <x0419>Russian</x0419>

 <x0422>Russian</x0422>

 <x0423>Russian</x0423>

</LanguageNameMap>

 

The codes are Windows language identifiers. You can assign any LID a custom name.

 

The next section contains predefined charsets:

 

<Charsets>

 <LatinAllCaps>ABCDEFGHIJKLMNOPQRSTUVWXYZ</LatinAllCaps>

 <LatinAllSmall>abcdefghijklmnopqrstuvwxyz</LatinAllSmall>

 ...

</Charsets>

 

All charsets are Unicode so that you can define any national characters.

 

The final section is "documents". All parts of this section have comments about document types. You can define common character sets and character sets that are related to system language. Each "attack" record defines the password length and character set.

 

In this XML file you can modify the standard preliminary attack and define custom character sets for any language.


Get more information about Advanced Office Password Recovery
Get full version of Advanced Office Password Recovery

© 2021 ElcomSoft Co.Ltd.