|
Message-ID: <YLiSlvCpQ3jkHTXJ@zurich> Date: Thu, 3 Jun 2021 10:28:06 +0200 From: Matthias Braun <matthias@...lbytes.com> To: john-users@...ts.openwall.com Subject: How does cracking pkzip2 files work? Hi, I'd like to understand how JtR uses the output of zip2john to crack the password of an pkzip2 archive. After reading the description of zip2john's output in the source file (https://github.com/openwall/john/blob/bleeding-jumbo/src/zip2john.c), this is my current assumption: Since the archive doesn't contain the hash of the password used for encrypting, per default, JtR tries a wordlist to decrypt the data stored at the DA position in zip2john's output, runs CRC32 on the result and compares that checksum with the checksum stored at the CR position. But in the case of cracking the password for a large file, I'd expect decryption to take quite a while, making each password guess costly. How does JtR crack pkzip2 archives? Thanks! Matthias
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.