bruteforce-salted-openssl 1.4.2-4 source package in Ubuntu

Changelog

bruteforce-salted-openssl (1.4.2-4) unstable; urgency=medium

  * Team upload.

  [ Joao Eriberto Mota Filho ]
  * debian/control: bumped Standards-Version to 4.6.1.
  * debian/copyright:
      - Converted the last paragraph of the GPL-3 in a comment.
      - Updated packaging copyright years.
  * debian/watch: updated the search rule to make it compliant with new
    standards of the GitHub.

  [ Debian Janitor ]
  * debian/control: Remove empty control field Uploaders.
  * Set upstream metadata fields: Repository, Repository-Browse.
  * Set upstream metadata fields: Bug-Database, Bug-Submit.
  * Bump debhelper from old 12 to 13.

 -- Joao Eriberto Mota Filho <email address hidden>  Wed, 21 Dec 2022 23:56:23 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Mantic release universe misc
Lunar release universe misc

Downloads

File Size SHA-256 Checksum
bruteforce-salted-openssl_1.4.2-4.dsc 2.1 KiB 00529946cca16856cd8c0305f0ca7ef79c1d4413490218f257fb7a09d19e3562
bruteforce-salted-openssl_1.4.2.orig.tar.gz 31.1 KiB 324092e60833329a13756b43c51269c1bd4a8cd339490217746ae0ee534efbac
bruteforce-salted-openssl_1.4.2-4.debian.tar.xz 5.9 KiB eaf6e5b7a51feb04773800688a4a8967ec6f96b46b0eb95c82abe5a8debd9329

No changes file available.

Binary packages built by this source

bruteforce-salted-openssl: try to find the passphrase for files encrypted with OpenSSL

 bruteforce-salted-openssl try to find the passphrase or password of a file
 that was encrypted with the openssl command. It can be used in two ways:
 .
    - Try all possible passwords given a charset.
    - Try all passwords in a file (dictionary).
 .
 bruteforce-salted-openssl have the following features:
 .
    - You can specify the number of threads to use when cracking a file.
    - The program should be able to use all the digests and symmetric ciphers
      available with the OpenSSL libraries installed on your system.
    - Sending a USR1 signal to a running bruteforce-salted-openssl process
      makes it print progress and continue.
    - There are an exhaustive mode and a dictionary mode.
 .
 In the exhaustive mode the program tries to decrypt the file by trying all
 possible passwords. It is especially useful if you know something about the
 password (i.e. you forgot a part of your password but still remember most of
 it). Finding the password of the file without knowing anything about it would
 take way too much time (unless the password is really short and/or weak).
 There are some command line options to specify:
 .
    - The minimum password length to try.
    - The maximum password length to try.
    - The beginning of the password.
    - The end of the password.
    - The character set to use (among the characters of the current locale).
 .
 In dictionary mode the program tries to decrypt the file by trying all the
 passwords contained in a file. The file must have one password per line.
 .
 This package is useful for security, pentests and forensics investigations.

bruteforce-salted-openssl-dbgsym: debug symbols for bruteforce-salted-openssl