Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <04a801d00ffb$a57d3ac0$f077b040$@cox.net>
Date: Thu, 4 Dec 2014 13:51:07 -0600
From: "jfoug" <jfoug@....net>
To: <john-users@...ts.openwall.com>
Subject: RE: Recovering password given the unpacked data available

search for pkcrack   It is a plaintext attack against pkzip encryption.  If this is the WinZip AES encryption, then I doubt having the plaintext will help you out at all.  pkcrack is simply an implementation of this known plaintext attack.  The attack only needs 13 bytes of original plaintext, which is the exact compressed data, but unencrypted.  The more data the better and faster the crack.  I have broken many zip files a decade or so ago using this technique.   There likely are other tools that are much more up to date than this (Elcomsoft ?)

> From: Rostislav Khlebnikov
> I have a rather unusual problem. I have the zip password-protected archive and I also have the extracted contents of the archive. Do you think there is a rather simple way to recover the password that the archive was created with?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.