I could do some programming if there are any libraries or routines that I could use. (If we assume corruption, not a password-blackout on my part) Maybe the brute-force thing might incorporate the fact that I know the password length and what characters it's made from. I know generally that brute force cracking is not feasible, but since I can remember probably more than half of the usernames/passwords, any maybe the fact that one of them does come up fairly often (my go-to pass for trivial stuff), that might simplify the brute force process to a doable time frame. I was wondering if there was any way for me to salvage my hard-gathered data. (which does seem to rule out KeePassX as the culprit, since oldest copies are before I edited the file from Ubuntu) I have tried opening the file with the "Repair KeePass Database file" which always gives the "0xA Invalid/corrupt file structure" (the same error for when a wrong password is typed). I have tried restoring older versions(even the original one) from Dropbox and trying out all possible passwords without any luck. kdb file got corrupted, either due to Dropbox syncing (only using it on one computer though) or because I edited the file using KeePassX on Ubuntu (dual boot on the same computer, accessing a mounted Win7 NTFS partition), or possibly a combination of both. Altough I might have mixed up a few letters I've tried about two dozen different combinations to minimize that possibility - but can't rule it out though. I'm fairly confident I have the right password. kdb file with the error "Invalid/wrong key". kdb file, only protected with a password. I started using Keepass about a month ago to hold my passwords and online accounts info.
0 Comments
Leave a Reply. |