PEM (Privacy Enhanced Mail)

Last modified: 2022-12-01

Cryptography

PEM uses RSA encryption.

Decrypt

First of all, you need to format the PEM file to make the John to recognize it.

pem2john example.pem > hash.txt

Crack the hash.

john --wordlist=wordlist.txt hash.txt