Re: pouzitelny desifrovac ZIP souboru
Petr Zapadlo
zapik na email.cz
Středa Březen 28 10:37:03 CEST 2012
Zdravím,
pokud není cizí Linux, pak jsem si dnes přečetl:
http://www.root.cz/clanky/softwarova-sklizen-28-3-2012/
hledejte RarCrack (prej umí i zipy)
Zapik
> ------------ Původní zpráva ------------
> Od: Michal Lukac <michal.lukac na fstroj.uniza.sk>
> Předmět: Re: pouzitelny desifrovac ZIP souboru
> Datum: 28.3.2012 10:34:24
> ----------------------------------------
> >-----Original Message-----
> >From: Michal Grunt
> >Sent: Wednesday, March 28, 2012 10:07 AM
> >To: HW-news
> >Subject: RE: pouzitelny desifrovac ZIP souboru
>
> >Asi před deseti lety jsem také potreboval heslo do ZIP archivu a nasel jsem
> >program, který na to nesel hrubou silou, ale stacilo mit na disku jeden
> >soubor, který byl stejny jako v >archivu (většinou se něco najde pokud
> >nejde zrovna jenom o dokumenty) a on to nejak porovnal a rovnou vypadlo
> >heslo. Akorat nevim jak se to jmenovalo :-) Akorat je otázka, zda >je to
> >pouzitelny na dnesni ZIP (ZIP64, UTF-8, ruzne druhy sifrovani...). Tak
> >třeba patrat timto smerem.
>
>
> asi treba hladat "known plaintext"
>
> napr: zip key to vie... ale je to dost stare..
>
> New Zip Key decrypts most of WinZip archives in less than an hour with our
> new SureZip™ Recovery
> All versions of WinZip and PKZip are supported
> Brute-Force, Xieve™, SureZip™, Known Plaintext or Dictionary attacks are
> used to recover the password
> Additional user dictionaries support, case changes, multiple mistypes and
> other modifications for each dictionary word
>
> SureZip™ Recovery decrypts Zip archives created with WinZip version 8.0 and
> earlier in less than an hour regardless of password used to protect it. At
> least 5 encrypted files are required in order to process the archive.
> Archives created with WinZip are supported.
>
> Limitations
> Zip compression software uses relatively strong encryption algorithm that
> makes instant password calculation (without knowing at least one file from
> the archive) impossible. Brute-force attack is the slowest approach and can
> test all the passwords of up to 8 characters. Xieve™ attack is much faster
> and is capable of recovering passwords of up to 10 characters. Dictionary
> attack is the fastest method - there's no limitation on password length.
> Known Plaintext attack instantly decrypts an archive if there is at least
> one file from the archive available unencrypted, regardless of the password
> length.
>
> M.
>
>
> _______________________________________________
> HW-list mailing list - sponsored by www.HW.cz
> Hw-list na list.hw.cz
> http://list.hw.cz/mailman/listinfo/hw-list
>
>
>
Další informace o konferenci Hw-list