Christian Tschabuschnig wrote: > > > John Lenz wrote: >> You could write your script to first build a database of the encryption >> of the text <?xml using all the different passwords in your list. Then, >> you just need to do a binary search for the first few bytes of the >> encrypted text. > > isn't the "<?xml" compressed by zlib in the original data-file before > getting encrypted? > Yes, you are correct. Sorry. The attack should still be feasable depending on the zlib algorithm (which I am not familiar with)
John