#Dictonary attack doesnt work on rar password unlocker archive
and starts at single character length I think as by the time I looked it was on 2 characters long.Īs a comparison I am going to test it against elcomsoft ARCHPR using similar character sets on same machine on same RAR archive it is averaging 63 tries per second, so around 2 and a half times faster than todays giveaway, still way slower than I would be inclined to use in earnest. It uses upper and lower case alpha, numeric and special characters no international characters. It will take days to even have a chance at approaching the passphrase! Part of the problem is there is no fine tuning for the character set used to brute force the passphrase and no min length start point and by the look of it no pause and resume on the brute forcing so no stopping for any reason and resuming where you left off when convenient. on this old downclocked vista machine running at 2.0GHz instead of 2.4GHz it is averaging 23 tries per second on a known RAR archive. I'm used to Elcomsoft ArchPR winzip doing over 30 Million attempts per second on winzip non vulnerable cipher. I was hoping it used some discovered weakness in RAR encryption like the old winzip cipher had and that was how it could claim to recover "Any RAR Password" Ass suspected this is a single threaded CPU core bruteforce password hacker.