 I want to demo PDF framework tables with Elkomsoft Advanced PDF Password Recovery. So we start the program and we open a PDF file. This is a sample file that I created and which is encrypted with the default Adobe PDF Password Encryption. So which is a 40-bit Elkomsoft here. We'll ask you for the password if you know it and now we will act as if we don't know it. No counsel. So to use the rainbow tables you will do a key search. So the type of attack is key search. Go to the key search tab and here you make sure that you enable use precomputed hash tables because this will use the rainbow tables. And then you can start the attack. So it is loading rainbow tables. You can see here that it is 40-bit security. So the encryption was done with a 40-bit key. Okay. And now the attack has started. Now this loading was really slow because I've noticed that the password recovery software here for loading the tables and performing the rainbow attack is much slower when I'm running my screen recording software. It is much faster when it is not running. So let's run this and in a couple of minutes it should find the key for this password protected PDF file. Okay. And now Elkomsoft here has recovered the encryption key. You can see it here F218AE94B6. So this is the encryption key. This is not the password. When you do a key attack you will recover the key, not the password. And this is a drawback when you have to decrypt several PDF documents that have been encrypted with the same password. Because each of those PDF documents, although it is encrypted with the same password, will have a different encryption key. Because the encryption key is not only derived from the password you provide, but also from information metadata stored in the PDF document itself. So we can decide to decrypt it like this and then we can save the decrypted version of the PDF document like this. So let me now show you just a dictionary attack so that you will see the difference with the key and a password attack. This one here. We start it and here we already have the result, the password, the user password for this PDF is secret. That's the word that is in a dictionary and that is why it was found so quickly. But you see you don't have the key here. You have the secret password and the hex representation of the secret password, but you don't have the key. Then when you do a password attack, you try to recover the password. And when you do a rainbow table attack, you try to recover the key.