$ bkcrack -k 18996980 070e64a5 38e61fb0 -r 8 \?aĬoncatenating the three keys gives us the PKZIP Master Key that we can try to crack with Hashcat. Writing unlocked archive cracked.zip with password "noraj"Įlse we can also try to crack the keys to find the original password.īkcrack can perform bruteforce on the keys but the options are limited and it doesn’t support wordlist attacks. We can create a copy archive with a chosen password. Then to recover the original files we have several options. Z reduction using 12 bytes of known plaintext ![]() $ bkcrack -C archive.zip -c 'logo_acceis.svg' -p plain.bin -x -1 19 ![]() It takes a long time (~24 min for this example) but we are able to recover the encryption keys.Ī wordlist attack would be more efficient for weak passwords but this method can help recover files protected with very complex passwords.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |