kimci86 / bkcrack

Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
zlib License
1.68k stars 163 forks source link

ZIP archive with deflated jpg's in a subdirectory #121

Closed MikeHotel0815 closed 3 months ago

MikeHotel0815 commented 5 months ago

Hi,

i have to retrieve the following files of a ZIP file:

image

The weird ASCII Letter is a german "ö". Is it possible to retrieve / delete the password? I know the model of the smartphone camera, that shot the photos and do even have other photos from this camera. Maybe that does help, to get the 12 Bytes? I checked a other image of that camera with a hex editor. The model is in there.

Is there a way for me, or do i have to fall back to dictionary?

kimci86 commented 5 months ago

Hi, It might be difficult, involving some tedious manual work, but it may be possible. The tricky part is to get correct compressed data to run a known plaintext attack with bkcrack.

I would suggest the following steps:

Because the compression ratio is close to 1, chances are you will find that some parts are embedded in the deflate streams as stored block (i.e. without compression). If that is the case, using that knowledge would be the least difficult way forward. Otherwise guessing compressed data might be too hard.

Let me know if that answers your question and if you need more help about this. You can post or email me some files if you want me to give it a try when I get some time. I like challenges :)

kimci86 commented 3 months ago

I close this because there was no feedback. Feel free to reopen if you want further help.