kimci86 / bkcrack

Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
zlib License
1.45k stars 151 forks source link

ZIP archive with deflated jpg's in a subdirectory #121

Open MikeEcho0815 opened 3 weeks ago

MikeEcho0815 commented 3 weeks ago

Hi,

i have to retrieve the following files of a ZIP file:

image

The weird ASCII Letter is a german "ö". Is it possible to retrieve / delete the password? I know the model of the smartphone camera, that shot the photos and do even have other photos from this camera. Maybe that does help, to get the 12 Bytes? I checked a other image of that camera with a hex editor. The model is in there.

Is there a way for me, or do i have to fall back to dictionary?

kimci86 commented 3 weeks ago

Hi, It might be difficult, involving some tedious manual work, but it may be possible. The tricky part is to get correct compressed data to run a known plaintext attack with bkcrack.

I would suggest the following steps:

Because the compression ratio is close to 1, chances are you will find that some parts are embedded in the deflate streams as stored block (i.e. without compression). If that is the case, using that knowledge would be the least difficult way forward. Otherwise guessing compressed data might be too hard.

Let me know if that answers your question and if you need more help about this. You can post or email me some files if you want me to give it a try when I get some time. I like challenges :)