I have a very fat problem, I have a client who has duplicate in the backup, and the previous computer company has left them lying, and does not have the password of the backup and the database has been deleted, there is no way to recover the password
Here I leave the coding that has the copies
or is there some way to bruteforce get it out or something
What is the keyboard config problem, and what does it have to do with password recovery?
Before trying recovery, are you positive you have no Duplicati-server.sqlite files or backups? Exporting a backup job configuration would also do the job if there’s one saved somewhere.
Such a file would have duplicati-config in its name. Basically do you have anything left?
Sometimes people also reuse passwords (though they shouldn’t), and it may help guessing.
Hi
I only got the backup files so unless that sqlite is in there I do not got it. When we typed in the paswd before backup it was not the keyboard language that we thougt it was so some of the charcters we do not know.
hello how are you I hope? I have a big problem, I have a sharpaescript script key and I need the key to configure my counter and it is possible to describe it
You’re posting in a “Recover the password topic”. If you mean can you recover it, you generally cannot, however see previous posts. I don’t know what “configure my counter” refers to. Maybe you can clarify.
What do you mean by “script key” above? If you mean the secret, that’s your secret. If you lost it, sorry.
For descriptions of internal details, refer to:
What do you consider to be a key? What sort of script is it making? What help do you need?
EDIT:
Here’s the SharpAESCrypt.exe help screen. It makes no mention of key or script, so I’m lost:
Usage: SharpAESCrypt e|d[o][1-4] <password> [<fromPath> [<toPath>]]
Use 'e' or 'd' to specify operation: encrypt or decrypt.
Append an 'o' to the operation for optimistic mode. This will skip some tests and leaves partial/invalid files on disk.
Append a single number (up to 4) to the operation to set the number of threads used for crypting. Default is single thread mode (1).
If you ommit the fromPath or toPath, stdin/stdout are used insted, e.g.:
SharpAESCrypt e 1234 < file.jpg > file.jpg.aes
Abnormal exit will return an errorlevel above 0 (zero):
4 - Password invalid
3 - HMAC Mismatch / altered data (also invalid password for version 0 files)
2 - Missing input stream / input file not found
1 - Any other cryptographic or IO exception