The Anatomy of Office Protection
Modern Microsoft Office documents (DOCX, XLSX, PPTX) use AES-128 or AES-256 encryption depending on the version. Unlike legacy binary formats (.doc, .xls) which relied on RC4, contemporary implementations hash passwords with SHA-512 over hundreds of thousands of iterations, making simple brute-force extraction computationally intensive.
How our recovery works
We extract the password hash structure from the uploaded file using the office2john tool, then run John the Ripper against curated wordlists optimised for Office documents. Typical Office-format files complete in seconds against a 10,000-entry dictionary.
-
menu_book
Curated Wordlists
Office-tuned dictionaries derived from leaked credential corpora and linguistic patterns.
-
memory
Volatile Processing
Files never touch persistent storage. The hash is computed in memory, passed to John, and purged as soon as a result is returned.