Brute forcing would be fine, since I don’t think I would’ve used a long password for this, but I don’t know how to automate that either. Any ideas?

    • ChaoticStupid@lemmy.worldOP
      link
      fedilink
      arrow-up
      16
      ·
      1 year ago

      I ran that exact script and it output that it found the password and that it was 123456. It was not 123456. The “unlocked document” it generated cannot even be opened. If you have an idea how that might be fixed I’d gladly take that and the password list(s). Don’t wanna share the document however, since I have entirely forgotten what’s in it, so it may or may not be sensitive

  • Eavolution@kbin.social
    link
    fedilink
    arrow-up
    19
    ·
    1 year ago

    You’re looking a tool called John the Ripper. The jumbo version comes with a script called office2john, which extracts the password hash for it to crack.

    I believe you can also use hashcat with the password hash, which will be a lot quicker if you have a GPU because John is CPU bound.

    • ChaoticStupid@lemmy.worldOP
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Tried to unzip it, but got an error saying that in order to unzip it I would have to add files to the archive first, so apparently the zip is empty? I… dont think its supposed to be empty

    • 520@kbin.social
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      John still works great! For modern documents you need a script to pull out the hash but other than that it’ll do the job fine

  • 520@kbin.social
    link
    fedilink
    arrow-up
    8
    ·
    1 year ago

    You can try using Office2John to create a hashfile for John the Ripper to crack, then use John the Ripper on said hashfile.

  • pectoralis@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    I’ve done this before by uploading the file to google drive which stripped the password off. I remember viewing it no problem but saving it was a few more steps. This was several years ago though so… Good luck!