How Brute Force (Should) Work
•
Read in first block of encrypted file
•
Try a password
•
Use file-matching techniques to
determine if password is valid
•
Keep trying in case of multiple “matches”
•
A skilled attacker will focus on the
target’s interests first