1 00:00:01,020 --> 00:00:06,090 In this lecture, we are going to see how we can crack office passwords with care. 2 00:00:07,110 --> 00:00:13,530 The first step is to get the hash from the office file on line X, and in the second step, we are going 3 00:00:13,530 --> 00:00:17,040 to crack the hash with hash tag on windows. 4 00:00:19,310 --> 00:00:23,720 So in the first step, copy the password protected file from windows machine to the machine. 5 00:00:23,960 --> 00:00:28,130 You can directly copy the file or you can use a USB to transfer the files. 6 00:00:28,840 --> 00:00:34,760 Now get the hash with the document with the given command office to your own mind or xl6. 7 00:00:34,760 --> 00:00:38,750 And it will save the hash in hash or text here. 8 00:00:38,870 --> 00:00:45,230 Correct me or Excel sex is the password protected file and hash dot text is a text file that will contain 9 00:00:45,230 --> 00:00:47,150 a hash that is required to be correct. 10 00:00:50,110 --> 00:00:53,920 Once you run the command, it restored the hash in the text file. 11 00:00:55,790 --> 00:00:55,960 No. 12 00:00:56,000 --> 00:00:57,150 Copy the hatch file. 13 00:00:57,170 --> 00:00:59,570 Back to windows and to the directory. 14 00:01:03,400 --> 00:01:07,540 Not open the text file and remove the file name from the contents. 15 00:01:14,400 --> 00:01:18,750 No, we need to open the PowerShell and then use the given command to correct the handshake. 16 00:01:19,690 --> 00:01:28,750 Here Dash is Collector's Edition and RM 9600 tells the hash here that is office password that is to 17 00:01:28,750 --> 00:01:37,060 be correct correct text restored the correct password hash dot text is the source file and additionally 18 00:01:37,060 --> 00:01:38,560 that we have already download it. 19 00:01:40,490 --> 00:01:46,910 If you have Office ten files or Office 13 files or over 16 files, there are different codes that you 20 00:01:46,910 --> 00:01:47,630 must remember. 21 00:01:47,630 --> 00:01:49,160 Or you can search them on the Google. 22 00:01:50,200 --> 00:01:50,590 No. 23 00:01:50,590 --> 00:01:52,690 Let's go to the actual demonstration. 24 00:01:53,850 --> 00:01:56,430 For this demo, we are going to create an Excel file. 25 00:01:56,880 --> 00:01:59,400 Just create an Excel file and write some data. 26 00:02:03,000 --> 00:02:03,960 Save the file. 27 00:02:13,760 --> 00:02:14,060 No. 28 00:02:14,060 --> 00:02:15,320 Well, saving the file. 29 00:02:15,350 --> 00:02:16,490 Go to those. 30 00:02:18,480 --> 00:02:19,620 You're not options. 31 00:02:21,130 --> 00:02:22,210 Give it a password. 32 00:02:26,920 --> 00:02:30,550 I'm going to give it a password of one, two, three, four, five, six for the demo. 33 00:02:33,460 --> 00:02:34,420 And Blake said. 34 00:02:35,780 --> 00:02:37,730 No, Our encrypted file is saved. 35 00:02:39,230 --> 00:02:39,360 Look. 36 00:02:39,410 --> 00:02:40,340 Close the file. 37 00:02:41,160 --> 00:02:42,300 Just copy the file. 38 00:02:43,990 --> 00:02:46,270 And paste it in the VMware machine. 39 00:02:47,500 --> 00:02:50,230 Just make sure that you paste it in the home directory. 40 00:02:59,720 --> 00:03:04,430 Now open the tribunal and use office to your utility to get the hash of the document. 41 00:03:08,300 --> 00:03:10,430 Just use the command as shown on the screen. 42 00:03:16,360 --> 00:03:21,790 Just list the file with Ellis command and you can see that hashed text is stored in our home directory. 43 00:03:23,940 --> 00:03:25,380 I'll open the home directory. 44 00:03:25,410 --> 00:03:27,150 Copy the text file. 45 00:03:31,080 --> 00:03:34,800 And we are going to paste this file in the Haskell directory on Windows. 46 00:03:41,920 --> 00:03:47,680 Once you have the hash or text file in the windows is open this file and move the file name from the 47 00:03:47,680 --> 00:03:48,700 file contents. 48 00:03:50,050 --> 00:03:53,770 This file name is only needed if we are going to correct the password. 49 00:03:53,770 --> 00:03:54,460 Which on. 50 00:03:56,070 --> 00:04:00,250 Don't open the PowerShell and use the command as shown on the screen. 51 00:04:08,350 --> 00:04:14,760 You do not need to give data and the three flags I have provided them because it helps me choose my 52 00:04:14,760 --> 00:04:16,350 graphic card on my machine. 53 00:04:16,890 --> 00:04:22,079 Otherwise it works fine as you use the command as I have provided you in the presentation. 54 00:04:22,930 --> 00:04:26,950 And you can see that Edgar is trying hard to crack the password. 55 00:04:27,670 --> 00:04:31,360 Her skirt is showing all entries from all traditionally against the password. 56 00:04:33,900 --> 00:04:35,760 Then you can see that the password is correct. 57 00:04:38,570 --> 00:04:42,940 The tribunal and open the text file in the card folder. 58 00:04:45,990 --> 00:04:50,160 And you can see the password, which is one, two, three, four, five, six in our case. 59 00:04:51,960 --> 00:04:53,550 I hope you like this lecture. 60 00:04:54,120 --> 00:04:55,740 See you in the next lecture.