Date: Mon, 9 Mar 2015 23:40:32 +0800 From: Kai Zhao <loverszhao@...il.com> To: john-dev@...ts.openwall.com Subject: Crack 7z format 7z_fmt_plug.c: https://github.com/loverszhaokai/JohnTheRipper/blob/bleeding-jumbo/src/7z_fmt_plug.c I want to test 7z format, here are what I think. 1. Use 7-zip to encrypt a file 2. How can I get the password file (like /ect/password and /etc/shadow) 3. Is the password file like the format described as 7z_fmt_plug.c ? "$7z$0$19$0$1122$8$d1f50227759415890000000000000000$1412385885$112$112 $5e5b8b734adf52a64c541a5a5369023d7cccb78bd910c0092535dfb013a5df84ac69 2c5311d2e7bbdc580f5b867f7b5dd43830f7b4f37e41c7277e228fb92a6dd854a3164 6ad117654182253706dae0c069d3f4ce46121d52b6f20741a0bb39fc61113ce14d22f 9184adafd6b5333fb1" 4. When I fuzzed a 7z-hash, how could I know the fuzzed hash is valid or not ? By the valid() function ? If a fuzzed 7z-hash passes valid() and takes a lot of time to crack, how should I judge the fuzzed 7z-hash whether is a wrong format ? Thank you in advance. Kai Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.