Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,154,918 members, 7,824,859 topics. Date: Saturday, 11 May 2024 at 07:28 PM

Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware - Programming (2) - Nairaland

Nairaland Forum / Science/Technology / Programming / Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware (1353 Views)

Help Pro JS Programmers, I'm Losing My Mind. / How To Upload Files To Firebase Cloud Storage Using Javascript / Am Here To Help You Solve Final Yr Project's On Computer Science Only (2) (3) (4)

(1) (2) (Reply) (Go Down)

Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 5:17pm On Jun 14, 2022
digitalman:


O DEAR ME. Why Wikipedia?

This is my area and where I have been working for over 15 years and I have given you a hint that there are some even free software that can do this in short time as long as you supply the original files and the encrypted file.

If you dont supply both files, then you talk about brute-force and taking too much time.

If you read my original post you will see where I said that "SOME" of these Ransomeware are the same but they hide their "type" by changing the file type. So IF by examination, the ransomeware is one of the "types" that has Decryption Solution, then the Decryption Software can do it.

Abeg Whatelse do you want me to say?



And I am saying your assumption that the provided plaintext file is the same exact file as the encrypted file is flawed. So let's say I provide you the plaintext and the encrypted version. Let's also assume you know the encryption algo used. Are you going to arrive at the key magically? Or aren't you going to try all the keys in the key set? Wouldn't that be a brute force?

15 years in a field is a lot of time and would make you an expert, but I struggle to understand how knowledge of the plaintext, encrypted file, and perhaps inferred knowledge about the algo would enable you pinpoint the key without trying out all (or a huge subset) of possible keys?
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by digitalman: 6:03pm On Jun 14, 2022
airsaylongcome:


And I am saying your assumption that the provided plaintext file is the same exact file as the encrypted file is flawed. So let's say I provide you the plaintext and the encrypted version. Let's also assume you know the encryption algo used. Are you going to arrive at the key magically? Or aren't you going to try all the keys in the key set? Wouldn't that be a brute force?

15 years in a field is a lot of time and would make you an expert, but I struggle to understand how knowledge of the plaintext, encrypted file, and perhaps inferred knowledge about the algo would enable you pinpoint the key without trying out all (or a huge subset) of possible keys?

I have not claimed to know how those specific decryption software for different ransomeware works. but know that its not brute force. Otherwise it will take time for sure.

(Just if you are lucky the encryption you have is one of those that has the "solution". )

Note that there are different Software for each known Ransomware.

Each Ransomeware that has the solution has a Decryption Software Solution that speciallises only in dealing with that Ransomware only.

Its not a single software-know-all type of Software.

For example, one software that decrypts limecrypter only decrypts lyme crypter.

Another one that decrypts, wanacry, only decrypts wannacry.

At least the ones I have used work like this.

And you must supply both encrypted and normal files.

And I am just providing info.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Xedmark: 7:06pm On Jun 14, 2022
airsaylongcome:


I wear it with pride. Every IT/Tech bro (or sis) is a "Google boy".
You're also a Tecno sorry Tech Guy? LMAO The word TECH has suffered. My First Class result is not from that (school) you also know naau? It didn't come by luck! Symmetric encryption logic will have destroy your brain and it's not just something your type will ever understand even if u leave google for YouTube. Lols.... can't stop laughing u need serious schooling son. He no even fit throw one arguement for symmetric logic, Na google screenshot we dey see. This one na dead skull ooo.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 7:24pm On Jun 14, 2022
Xedmark:
You're also a Tecno sorry Tech Guy? LMAO The word TECH has suffered. My First Class result is not from that (school) you also know naau? It didn't come by luck! Symmetric encryption logic will have destroy your brain and it's not just something your type will ever understand even if u leave google for YouTube. Lols.... can't stop laughing u need serious schooling son. He no even fit throw one arguement for symmetric logic, Na google screenshot we dey see. This one na dead skull ooo.

Lol! First Class graduate that says Symmetric Encryption is a one way encryption. Continue sir. You are the baba of Cryptography. Chief proponent of Public Key encryption and last Professor of Cryptography. Enjoy. Say Symmetric Encryption na one way. Enjoy the floor
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 7:31pm On Jun 14, 2022
digitalman:


I have not claimed to know how those specific decryption software for different ransomeware works. but know that its not brute force. Otherwise it will take time for sure.

(Just if you are lucky the encryption you have is one of those that has the "solution". )

Note that there are different Software for each known Ransomware.


Each Ransomeware that has the solution has a Decryption Software Solution that speciallises only in dealing with that Ransomware only.

Its not a single software-know-all type of Software.

For example, one software that decrypts limecrypter only decrypts lyme crypter.

Another one that decrypts, wanacry, only decrypts wannacry.

At least the ones I have used work like this.

And you must supply both encrypted and normal files.

And I am just providing info.


So, that testing out the different decryption software is the brute-force I'm talking about. Even within decryption software, you would need to try out a large number of possible keys to be able to decrypt the ciphertext

Meanwhile I just checked the headless chicken running around claiming that Symmetric Encryption is one way encryption. Mofo plastered his phone number allover Nairaland hunting down 50k programmer training job. Apologies to all other folks in Ibadan (born there and got my blood stripes at Alomaja), but there's a reason he lives in IB. Probably Akobo, General gas or Challenge.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by digitalman: 8:25pm On Jun 14, 2022
airsaylongcome:


So, that testing out the different decryption software is the brute-force I'm talking about. Even within decryption software, you would need to try out a large number of possible keys to be able to decrypt the ciphertext

Meanwhile I just checked the headless chicken running around claiming that Symmetric Encryption is one way encryption. Mofo plastered his phone number allover Nairaland hunting down 50k programmer training job. Apologies to all other folks in Ibadan (born there and got my blood stripes at Alomaja), but there's a reason he lives in IB. Probably Akobo, General gas or Challenge.

ok sir.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Xedmark: 4:15am On Jun 15, 2022
airsaylongcome:


Lol! First Class graduate that says Symmetric Encryption is a one way encryption. Continue sir. You are the baba of Cryptography. Chief proponent of Public Key encryption and last Professor of Cryptography. Enjoy. Say Symmetric Encryption na one way. Enjoy the floor
Ewe!! Go and ask Tech guys about it, we don't read it, we do it. Boy literally was giving us screenshots, a road side mechanic would have done the same. I just encrypted a word in cryptography x#yu77yiruh??aSgG63gdhdhPtyedrt that's the result, decrypt it. I just told u the algorithm I used since it's not one way encryption....LOL....OMO If I'm the one who paid for your schooling in the 2000s like u claimed, I will
use dangote's trailer to crush that your decayed head since it's useless. Your stature must be a fat body with a small onion-head dum-dum kind, bouncing like a pig skin. kid who can't comprehend a single eye snap. " Mummy what did u say? Are u saying I shouldn't eat the food? " - "Nooooo!!! Just eat. Once you're done let's go home."
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by mcameo: 8:41am On Jun 15, 2022
Kinzeyfranks:
Okay bro,
But I will wait.
But if you don't mind, I would like to contact you directly to see how I can get this fixed asap
God bless.




What is the name of the ransomware?
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by UtuokeAlcoholic: 1:09pm On Jun 15, 2022
airsaylongcome:
God! Too many nonsense written here in attempts to sound like hackers. Good Lord. Someone says Symmetric Encryption aka Private Key encryption is a one way encryption!
I was not the only one that noticed this nonsense
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 2:11pm On Jun 15, 2022
UtuokeAlcoholic:
I was not the only one that noticed this nonsense

I'm happy to hear this. The silly moniker has been running around with insults about how Symmetric Encryption is not Private Key encryption. Shared a ciphertext supposedly encrypted with a Private Key cipher and asked me to decrypt. No name of the cipher and no Private Key. If I claimed I was a Cryptanalyst I would have understood him leaving out those bits of info. I just let it slide because I don't have time schooling folks who are obvious dumbos. High level, Cryptography is very straightforward. Yes, operational; the ciphers are ruthlessly complex but the high level ideas are straight so I was blown away to read the volume of nonsense peddled by all these script kiddies
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Xedmark: 2:28pm On Jun 15, 2022
UtuokeAlcoholic:
I was not the only one that noticed this nonsense

Lol.... U too wan belong... Even grave understand your condition. Despite the fact that what I posted has been twisted, I didn't even bother to explain. U just will never be worthy of my explanation. Ur moniker suits u. How many of your mates did u help pick their shoes while in school?....... Open your eyes and go and read my first comment again.... Even if it's thrown on the street will it ever get to u?
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by faruqa97: 3:03pm On Jun 15, 2022
My goodness, this forum is full of jokers, bro, there is an option, I can't guarantee 100% recovery but if you are quick enough, you could recover most of your data, send me your WhatsApp number quick, don't worry, I won't charge you Kobo, just be fast.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by digitalman: 9:12pm On Jun 15, 2022
I must confess that I shouldnt have been here.

I cannot understand the verbal hostilities.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Contekbbc: 3:01pm On Jun 16, 2022
Bro
Your are part of those people I so much respect in this forum but killing people's ideas by saying 'It won't work" is a big NO for me.

Let's try and wait for the the outcome of any idea before we start criticizing them.

No one knows it all, we could learn from anything however stupid or illogical they may seem.

Once again,one love


airsaylongcome:


Okay. Let everyone (myself included) remain and excel with their limited knowledge

A brute force attack on a 256-bit key AES algorithm is taking 9.63×10^52 years to brute force. That is billions of years! And this is for a simpler Symmetric Key encryption running on a super computer o. Not consumer grade developer laptop with 8-16gb RAM and heavily limited processor. We haven't thought to discuss brute forcing a Public Key algorithm that is inherently more difficult.

Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by niel63(m): 3:37pm On Jun 16, 2022
airsaylongcome:
God! Too many nonsense written here in attempts to sound like hackers. Good Lord. Someone says Symmetric Encryption aka Private Key encryption is a one way encryption!

Me I just confuse sha... people just dey talk gibberish. I don tell op make he forget am. E get why dem call am ransomware. grin grin grin

Oya take the bandits wey dey kidnap people for example. Why u think say 9ja military never fit catch em? The ransom involved will make it difficult.

I've used the 3 major OS... broken a few PCs while playing with Linux. Omo... we don explore deep web tire. At the end, I chose peace of mind.
Nothing concern me and windows again for life. No hard feelings for the users ooo... but for someone who has used different Linux distros even that tiny one grin. Omo, no be beans.

When you learn the hard way of using computers, you evolve.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Xedmark: 4:17pm On Jun 16, 2022
Lols....even those who paid PR can't get the level of attention I've gotten this last few days... Seriously laughing on my chair. Since we want to go to school, let me school some folks here. Symmetric is obviously the simplest form of encryption but can it function as a one way encryption which can't be reversed? Why not, the purpose of any form of encryption is to make the key words irreversible. However in the true sense of it, is there any form of encryption that is not reversible? It's just going to be almost impossible but with alot of dictionary of hack key words for brute force and attacking the host of such file source in exchange for your file somehow a method must work this doesn't come by searching google or watching YouTube. The kid even mentioned needing a cypher to decrypt, dead skulls are just every where ....... If a prostitute can be killed and get burnt probably for her profession let's just hope we won't start seeing boys getting their balls scrapped and eyes plucked out for terrible coding job. I'm sure prospects can see this, hopefully we can get another programmer on this post.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 4:50pm On Jun 16, 2022
Contekbbc:
Bro
Your are part of those people I so much respect in this forum but killing people's ideas by saying 'It won't work" is a big NO for me.

Let's try and wait for the the outcome of any idea before we start criticizing them.

No one knows it all, we could learn from anything however stupid or illogical they may seem.

Once again,one love



Bruv, I appreciate the respect and I'm glad to hear or. I acknowledge that knowledge is infinite and no one can claim to know it all. I definitely DO NOT know all of the facets of computing and I'm the first to acknowledge that. For example I am horrible at frontend Web dev, CSS to be very specific. I cannot develop a website from scratch if I'm given a blank notepad!

About your comment that I am killing people's ideas by saying 'It won't work", maybe I'm too much of a Blunt realist. But allow me to illustrate with an example. Is it possible to dig a 10ft water well using a spoon? Without a doubt! Given sufficient time and energy, anyone can dig a well using even a teaspoon! You just have to be patient and dedicated. Heck you can dig a 10ft well using just your fingers if you have all the time in the world and there is no time limit to how long you can take to dig that well. Can you dig a well using a teaspoon in 10 hours? My brother, unless it's a super human, you cannot.

The OP is writing his final year project that needs to be submitted by a deadline (most likely that deadline is in a specific date this year). He has his files encrypted, he knows nothing about the encryption algorithm or the key used to encrypt his files. Given these unknowns, his best option is to try to run all possible encryption algorithms (known and unknown) while trying all possible encryption keys. Assuming a simple encryption algorithm was used, the chances of success is very slim. Let's complicate it by saying each file was encrypted using a different encryption algorithm each of which used a different encryption key. It would mean that he would have to run every possible encryption algorithm, against a every possible encryption key for all his files. Is this possible to accomplish if there is no time limit? Sure. Can he run all possible permutations before the due date of the project? Possible but highly unlikely. So yes you are right that it is possible if there were no time limits and he had formidable computing resources. So yeah, you are right that it is possible and I was completely out of order to say it's impossible
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Contekbbc: 5:01pm On Jun 16, 2022
Much respect bro.

I'm your die- hard fan I swear and who am I to correct the boss them,I just felt like calling your attention to it and meant no harm.

Jah bless and many love from here.
Continue to soar higher bro!



airsaylongcome:


Bruv, I appreciate the respect and I'm glad to hear or. I acknowledge that knowledge is infinite and no one can claim to know it all. I definitely DO NOT know all of the facets of computing and I'm the first to acknowledge that. For example I am horrible at frontend Web dev, CSS to be very specific. I cannot develop a website from scratch if I'm given a blank notepad!

About your comment that I am killing people's ideas by saying 'It won't work", maybe I'm too much of a Blunt realist. But allow me to illustrate with an example. Is it possible to dig a 10ft water well using a spoon? Without a doubt! Given sufficient time and energy, anyone can dig a well using even a teaspoon! You just have to be patient and dedicated. Heck you can dig a 10ft well using just your fingers if you have all the time in the world and there is no time limit to how long you can take to dig that well. Can you dig a well using a teaspoon in 10 hours? My brother, unless it's a super human, you cannot.

The OP is writing his final year project that needs to be submitted by a deadline (most likely that deadline is in a specific date this year). He has his files encrypted, he knows nothing about the encryption algorithm or the key used to encrypt his files. Given these unknowns, his best option is to try to run all possible encryption algorithms (known and unknown) while trying all possible encryption keys. Assuming a simple encryption algorithm was used, the chances of success is very slim. Let's complicate it by saying each file was encrypted using a different encryption algorithm each of which used a different encryption key. It would mean that he would have to run every possible encryption algorithm, against a every possible encryption key for all his files. Is this possible to accomplish if there is no time limit? Sure. Can he run all possible permutations before the due date of the project? Possible but highly unlikely. So yes you are right that it is possible if there were no time limits and he had formidable computing resources. So yeah, you are right that it is possible and I was completely out of order to say it's impossible
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 5:04pm On Jun 16, 2022
It's laughable man. We have now moved from saying

"There are so many encryption that has one way encryption algorithm They are called Symmetric Algorithm." (implying that any encryption that has one way encryption is called Symmetric Encryption) to

"Symmetric...encryption...can...function as a one way encryption which can't be reversed" (meaning that Symmetric Encryption is also reversible unless it is explicitly used as a one-way encryption - such as in hashing or digital signatures)


In the data security field, encryption and hashing are commonly compared, but why is this the case. Encryption is a two-way function where data is passed in as plaintext and comes out as ciphertext, which is unreadable. Since encryption is two-way, the data can be decrypted so it is readable again. Hashing, on the other hand, is one-way, meaning the plaintext is scrambled into a unique digest, through the use of a salt, that cannot be decrypted. Technically, hashing can be reversed, but the computational power needed to decrypt it makes decryption infeasible. A message digest (file signature) is different from a ciphertext

At this point, I'm gonna take my leave. Let these script kiddies continue to wallow in their folly that Private Key encryption is a one-way, irreversible process.

1 Like

Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by Xedmark: 5:44pm On Jun 16, 2022
Eeeeyah!! U mean symmetric key algorithm. How did u finish secondary school? I'm dazed. School cert plus NIIT, bros I envy u... I'm sure folks with eyes can see in my post where i questioned if really there's any encryption that can't be compromised with adequate efforts. By the way, I've missed your google search screen shots. Hopefully u will one day learn that inventions don't take place by relying on the knowledge of someone else online. Exactly why it is called programming.
Re: Please Help: I'm At The Verge Of Losing My Final Yr Project Files To Ransomware by airsaylongcome: 5:50pm On Jun 16, 2022
I'm literally quoting what they said, "Symmetric Algorithm” and “Symmetric Encryption” and they are trying to correct me by saying Symmetric Key algorithm. I laugh and I thank God I to finish School cert (with P7 all over) and barely passed NIIT.

1 Like

(1) (2) (Reply)

Do Want To Start Programming? / URL Shortener With Search Function / So You Want To Be An App Developer? Here’s How [INFOGRAPHIC]

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 71
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.