StarOffice Password protected file Help!

Posted on 2009-07-07
Last Modified: 2012-05-07
I have a close family friend who's husband has just passed away, Ive been helping her gain access to her husbands laptop ect, he was the accountant for the family business, He used Star office version 8, the problem we have is many of his files are password protected.

I have 2 questions

1) How many attempts can the wife have to try and guess the password before she's locked out of the file?
2) Is there any way to hack/bypass these passwords? (3rd party software, a company ect ect)

I would really appreciate your help as the family's bank manager is visiting on Wednesday to go over the health of the business and many of these important financial files are locked.

Thanks in advance

Question by:D_Mclean
LVL 33

Accepted Solution

Dave Howe earned 500 total points
ID: 24793443
Ok, from the top.

you can try guessing as many times as you like - there is no magic lockout; but there is also no halfway result, either a guess is correct, or it doesn't work (so if you try I_love_cookies but the password was I_Love_Cookies you won't get in)

there is a commercial crack tool, but it isn't instantaneous - in fact, it can take days or weeks to run.

There is also a free tool here:

which is purely a dictionary tool - you have to give it a list of possible passwords, but it is much faster than trying each one in turn by hand.

staroffice files are very secure indeed. At the base, they are zipfiles - so you can open them using any zip file tool ( being my usual choice)

inside, you will find a manifest (xml file in a subdir called META-INF) which you can edit with notepad. this gives details of what is stored where inside the zipfile, and if it is encrypted, what the checksum of the password is.

here is a typical entry:

 <manifest:file-entry manifest:media-type="text/xml" manifest:full-path="content.xml" manifest:size="2939">
  <manifest:encryption-data manifest:checksum-type="SHA1/1K" manifest:checksum="vsANgJ9HW/9Z0tfHwvzX1HOROGs=">
   <manifest:algorithm manifest:algorithm-name="Blowfish CFB" manifest:initialisation-vector="yOxT+y66yJg="/>
   <manifest:key-derivation manifest:key-derivation-name="PBKDF2" manifest:iteration-count="1024" manifest:salt="qdlQxndpRh0cANpXCVhjXw=="/>

note this specifies that the encryption is blowfish (only supported algo), and the hash is SHA1 (only supported hash). Blowfish is uncrackable. no, really, there isn't a hope of breaking it unless you can guess the password.

the hash is the clue - it will let you test if you got a guess right or wrong, without having to try each password in turn in the package. This is how the crackers work - they try every possible password (either from a list you supply, or by starting at aaaaa and working their way towards z) and test the answer against the hash. if the hash says they got it right, they can then try decrypting the actual document.

however, this is called a brute force attack - trying many passwords until you find one that works - and it can take a fairly long time to do, even on a modern computer.

Author Comment

ID: 24793828
Thats excellent info Dave exactly what I need, ive certainly got enough to be going on with that lot.

Thanks very much


Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best practices for concurrency when using SQL Server encryption 7 131
File Encryption 12 48
cryptolocker in a desktop 3 81
Which is 'Static Key Ciphers' reported in PT scan? 4 295
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Encryption for Business Encryption ( ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question