-
-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The best way to deal with this zip archive #116
Comments
echo -n "<!DOCTYPE html>" > p1.txt bkcrack -L filename.zip bkcrack -C filename.zip --cipher-index Index_of_any_html_File -p p1.txt |
Hi, I see two approaches to crack this archive with bkcrack. You can see some files inside your archive are compressed (method ZipCrypto Deflate) and some other files are stored (method ZipCrypto Store). The first approach would be to guess a part of the content of a stored file and use it as known plaintext for the attack. The stored files you can target are txt files so it is not obvious what they could be made of but maybe the filenames give more information about what could be inside. Maybe you know or remember something about those files. The second approach would be to target one of the compressed files. This requires you can find a plain copy of one of those files somewhere else in a backup or online for example. Once you have such a file, you would put it in a unencrypted compressed zip archive to get compressed data usable for the attack. You need the compressed data to match what was put in the encrypted archive just before encryption, so compression parameters must be the same. This might require some guesses and several tries with different tools and parameters to get the right compression. To summarize, running a known-plaintext attack with bkcrack requires some knowledge of the archive content, either by making guesses or using a plain entire file available somewhere else. In case you do not have such information, then a known-plaintext attack might be impossible. You could try alternative approches to crack the archive with password cracking tools such as hashcat or john the ripper. |
For the second .txt file(CRC: CC2E3C2F) you tagged: For windows:
If you get the key, you can use |
@mohegazy1 Does that answer your question? Did it work? |
Unfortunately no, I tried both methods but no results |
Do you want help about it? If so, what did you try exactly and what was the outcome? |
@mohegazy1 Are you still looking for help about this? If so, please provide information about what you tried and how it went. Otherwise, I will close this issue. |
Hello
I am very new to codes and scripts
I want to know what is the best way to use the tool to handle this archive
note , I have tried a lot, but I fail every time
The text was updated successfully, but these errors were encountered: