A Bash script that attempts to decrypt OpenSSL encrypted files using a given password or wordlist across multiple algorithms.
Bash script that given a password (or a wordlist) tries to decrypt an OpenSSL encrypted file using several algorithms.
This tool is primarily used by security professionals and penetration testers to automate the brute-force decryption of OpenSSL encrypted files when the password is unknown. It supports multiple cipher algorithms and can utilize either a single password or a wordlist to attempt decryption, making it useful in CTF challenges or forensic investigations.
This script requires Bash and OpenSSL installed on the host system. It is designed for use on encrypted files where the password is unknown but can be guessed or brute-forced. Users should ensure they have legal authorization to attempt decryption on any files to avoid unauthorized access issues.
Clone the repository using git clone https://github.com/carlospolop/easy_BFopensslCTF.git
Navigate to the cloned directory
Ensure Bash is installed on your system
Make the script executable if necessary (chmod +x bf_openssl.bash)
bf_openssl.bash -f input_file -t password
Attempt to decrypt the specified OpenSSL encrypted file using the provided password.
bf_openssl.bash -f input_file -p pass_file
Attempt to decrypt the specified OpenSSL encrypted file using passwords from the given wordlist file.
bf_openssl.bash -f input_file -a
Try all supported OpenSSL cipher algorithms to decrypt the input file.
bf_openssl.bash -f input_file -b
Indicate that the input file is Base64 encoded and should be decoded before decryption attempts.
bf_openssl.bash -h
Display the help message with usage options.
bf_openssl.bash -f input_file -v
Run the script with verbose output to show detailed processing information.