lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <E211C813-B265-49B2-8034-EBB508E1442D@gmail.com> Date: Tue, 29 Mar 2011 15:22:36 -0700 From: Andrew Farmer <andfarm@...il.com> To: Full Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Launched New Tool - RAR Password Unlocker On 2011-03-29, at 12:29, kai@...nn.net wrote: > is there any chance of seeing CUDA in action for the next versions? :) Ha ha ha, no. (See below.) >>> Installed executable is completely portable. > > why do we need installer then? distribute that tool as single > executable. Because without the installer, it can't try to "monetize" the install by installing search toolbars! (It's nice enough to continue the install if you reject their terms, though.) On 2011-03-29, at 13:13, Jo Galara wrote: > How does it work? Bruteforce? Yes, but... well, JAD does a better job of explaining than I possibly could: > Runtime rt = Runtime.getRuntime(); > > String str = "7z.exe x "; > str = str + "\"" + _filepath + "\" "; > str = str + "-p\"" + pwd + "\" "; > str = str + "-o\"" + _destpath + "\""; > str = str + " -y"; > > System.out.println(str); > > Process p = rt.exec(str); > p.waitFor(); > > if (p.exitValue() == 0) > { > ret = true; > } _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists