Package: pdfcrack Version: 0.19-3 Severity: normal Dear Maintainer, I am trying to bruteforce a document sent to me whose password doesn't match. For this I used pdfcrack.
Now I do not know whether it is because it is version 1.5 or whatever the password doesn't work. I used the following link to understand how pdfcrack works. https://www.maketecheasier.com/recover-lost-pdf-passwords-linux/ Now while I could do a wordlist, first I tried using -n as shared in the manpage - -n, --minpw=INTEGER Skip trying passwords shorter than INTEGER As can be seen it says and IIUC, it means it will skip passwords lover than the number given - $ pdfcrack -f document.pdf -n=09 PDF version 1.5 Security Handler: Standard V: 2 R: 3 P: -1068 Length: 128 Encrypted Metadata: True FileID: 0 U= O= Average Speed: 48106.7 w/s. Current Word: 'qrbd' ^CCaught signal 2! Trying to save state... Successfully saved state to savedstate.sav! Now, as the file is sensitive in nature, I have removed the FileID as well as whatever hashes were generated by the file. Now the thing is, the current word or password it tries to hack is 'grbd' which is only 6 letters and not 9. IIUC, what I did above is have 9 letters instead of 6, what am I doing wrong? -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (900, 'testing'), (500, 'testing-debug'), (100, 'unstable-debug'), (100, 'experimental'), (100, 'unstable'), (50, 'experimental-debug') Architecture: amd64 (x86_64) Kernel: Linux 6.0.0-2-amd64 (SMP w/4 CPU threads; PREEMPT) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8), LANGUAGE=en_IN:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages pdfcrack depends on: ii libc6 2.35-4 pdfcrack recommends no packages. Versions of packages pdfcrack suggests: ii atril [pdf-viewer] 1.26.0-1 ii evince [pdf-viewer] 43.0-1 ii okular [pdf-viewer] 4:22.04.3-1 ii qpdfview [pdf-viewer] 0.4.18+ds-9 -- no debconf information -- Regards, Shirish Agarwal शिरीष अग्रवाल My quotes in this email licensed under CC 3.0 https://creativecommons.org/licenses/by-nc/3.0/ https://flossexperiences.wordpress.com E493 D466 6D67 59F5 1FD0 930F 870E 9A5B 5869 609C