Cracking Encrypted PDFs – Part 3

I performed a brute-force attack on the password of an encrypted PDF and a brute-force attack on the key of (another) encrypted PDF, both PDFs are part of a challenge published by John August. The encryption key is derived from the password. it’s not just based on the password only, but also on metadata. This … Continue reading Cracking Encrypted PDFs – Part 3