I have an archive named “archive.tar.bz2” that was encrypted with OpenSSL using a passphrase I no longer possess. There are no password hints or partial phrases available. While the data is not time-critical, recovering it is important to me. You will attempt to recover the passphrase—or bypass it—using any lawful means such as brute-force, dictionary or other advanced cryptanalytic techniques. The encryption parameters and any metadata present in the file will be provided once we start so you can choose the most efficient approach (e.g., OpenSSL command-line analysis, hash extraction, GPU-accelerated tools like hashcat, John the Ripper, or custom scripts in Python, C, etc.). Deliverables: • A fully decrypted tar.bz2 archive (or its extracted contents) • A brief outline of the method and tools you used so I can verify and reproduce the process if necessary Please confirm your experience with OpenSSL encryption formats and password-cracking frameworks when you respond.