[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Encrypted .zip password recovery

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 52
Thread images: 4

File: Screen_170610_095338.png (13KB, 250x181px) Image search: [Google]
Screen_170610_095338.png
13KB, 250x181px
I have two versions of the same folder.
One is in an encrypted .zip file and the other is in an unencrypted one.

Is there a way to use the unencrypted files to find the password of the encrypted archive?

Thank you in advance.
>>
>>60836150
unless you are an nsa agent, give it up.
>>
>>60836169
I thought there were ways to compare the encrypted content with the unencrypted one (since they're exactly the same) to find the difference.

Or is it just research-lab type of stuff?
>>
I found a program called PkCrack that does exactly this, but my computer can't run it because it's 64bit and ATM I can't install a VM.

Does anybody know of some other way?
>>
>>60836308
>32 bit
it's not 1999 anymore.
right?
>>
>>60836348
It apparently is for that program.
>>
File: 1493943136955.jpg (59KB, 474x720px) Image search: [Google]
1493943136955.jpg
59KB, 474x720px
>>60836358
Holy shit are you retarded? x86 is backwards compatible to x86_64.
>>
Why do you need the ZIP archive if you already have the contents?
>>
i think rarcrack can do encrypted zips as well
>>
Give the files back, Tyrone
>>
>>60836386
I don't know much about this.
How do I run this 32bit program on my 64bit Windows 7?

>>60836388
>Why do you need the ZIP archive if you already have the contents?
I have many encrypted archives from this source, but only have a few without the password (of which I also have the encrypted version).
I'm trying to find the password of the archives that I have the unencrypted version of, hoping that it will be the same for all the other archives.

>>60836395
Will check it out right now, thank you.
>>
What you want to do is know as https://en.wikipedia.org/wiki/Known-plaintext_attack knowing the plaintext is significantly useful with symmetric-key algorithms (like AES) only when shitty block cipher modes are used. Keep in mind this is advanced cryptanalysis you are not going to find and executable on the internet that will find the password for you in a reasonable time.
>>
>>60836509
Yeah, that's what I searched when I found PkCrack (which does that kind of attack), but I can't run it on my computer.
>>
>>60836426
everything 32bit will work on a 64bit OS....
>>
>>60837454
Pic related is what I get if I try to double click on it, and I'm not the only one having this problem according to the comments on this:
https://www.hackthis.co.uk/articles/known-plaintext-attack-cracking-zip-files

If you have a 64bit Windows version you can try yourself:
https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html
>>
>>60837487
developed by (((Eli Biham))) and Paul (((Kocher)))

Nice try, shlomo.
>>
>>60837487
dont double click, open it from cmd
>>
>>60837499
If you have an alternative please tell me about it.
>>
>>60837487
dude, those aren't windows programs, they're 32bit DOS programs
>>
>>60837524
% file *
doc: directory
extract.exe: MS-DOS executable, COFF for MS-DOS, DJGPP go32 DOS extender
findkey.exe: MS-DOS executable, COFF for MS-DOS, DJGPP go32 DOS extender
makekey.exe: MS-DOS executable, COFF for MS-DOS, DJGPP go32 DOS extender
pkcrack.exe: MS-DOS executable, COFF for MS-DOS, DJGPP go32 DOS extender
zipdecrypt.exe: MS-DOS executable, COFF for MS-DOS, DJGPP go32 DOS extender
>>
>>60837513
I know. That's what the documentation and tutorial say.
When I do that it doesn't work (don't remember exactly what it says).

>>60837524
But the tutorial shows that they work in Windows.

Are you sure you clicked on the right link?
https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack/download2.html
>>
>>60837535
>But the tutorial shows that they work in Windows.
sure, 32bit windows with support for DOS programs, aka, not 64bit windows

looks like it compiles ok on 64bit linux though
>>
File: 1492180933598.jpg (97KB, 600x786px) Image search: [Google]
1492180933598.jpg
97KB, 600x786px
>>60836426
>How do I run this 32bit program on my 64bit Windows 7
>>
>>60837555
Ah, that's why then.

Is there a way to run it on 64bit Windows witout a VM?
>>
>>60837571
Just get a 32bit vm, dont be lazy
>>
>>60837593
It's not lazyness.
I just don't have the HDD space at the moment.
>>
Upload the .zip somewhere and I can run hashcat on it for a while.
>>
>>60837571
built you some 64bit windows binaries using mingw
completely untested
https://my.mixtape.moe/kntpoz.7z
>>
>>60837615
% file *
extract: PE32+ executable (console) x86-64, for MS Windows
findkey: PE32+ executable (console) x86-64, for MS Windows
makekey: PE32+ executable (console) x86-64, for MS Windows
pkcrack: PE32+ executable (console) x86-64, for MS Windows
zipdecrypt: PE32+ executable (console) x86-64, for MS Windows


ps. they're still console appllications, so be sure to run them from cmd, just double clicking on them will result in a cmd window flashing open and closed immediately
>>
>>60837615
>>60837633
Thank you very much, but I don't think it's a very good idea to run programs I've downloaded from 4chan.
Maybe I'll try it later if everything else fails.
Don't get me wrong, I'm grateful for your work, but I don't know you, so I can't just trust what you say if the stakes can be so high (you fucking with my computer).
>>
>>60837663
you could compile them yourself
i just changed "CC=gcc" at the top of the Makefile to "CC=x86_64-w64-mingw32-gcc"
>>
>>60837677
I've never done this, so it'll take me a bit to learn how.
I'll try it in a couple of hours, thank you very much.
>>
>>60836150
Wrathion is state-of-the-art
>>
>>60837701
if it's easier you could run mine under sandboxie instead, that way they couldn't fuck with your machine even if they were dodgy
honestly you should be using that for untrustworthy things anyway
>>
>>60837759
Will it work with the cmd too?
>>
>>60837784
i suppose, i don't use windows myself, it's just something i've seen recommended
>>
>>60837790
Ah, thank you anyway.
I'll try it later.
>>
>>60836348
>>60836358
>>60836426
>>60837663
Summer is here
>>
File: 1417119585903.jpg (104KB, 406x364px) Image search: [Google]
1417119585903.jpg
104KB, 406x364px
>>60838053
>le summer
>>
>>60836150
No
>>
>>60837604

are you running windows off of a 2GB compact flash card? how can you possibly have no hard drive space for the program.
>>
>>60838586
It's a 500GB HDD that's full of stuff since my external hard drive started to fail (so I had to move everything I could to my internal for the time being), and only have a few GBs free and can't install a Windows VM.
>>
Go find...

"Advanced Archive Password Recovery Professional (ARCHPR) v4.50"
>>
maybe run the executables through dosbox
>>
>>60839663
>password cracker on an emulated cpu
you'd have to be very patient
>>
>>60839677
it's not bruteforce though
>>
>>60836150
No. You have to brute force the password using a cracking program.
>>
Hashcat can do zip archive iirc, its probabaly yout best bet.
>>
>>60836150
Give it back Jamal.
>>
>>60837524
>32 bit DOS programs
Thanks for the laugh, mate.
>>
>>60836150
>AES256
inb4 the brutef orce. No, it's over
>>
>>60836308
You can't virtualize 64bit on 32bit you stupid fucking idiot. Get off of /g/.
Thread posts: 52
Thread images: 4


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.