|
Message-ID: <89C023C0-62D2-4774-9814-3B7B508B525F@promon.no> Date: Fri, 3 Sep 2021 11:42:33 +0000 From: Cameron Palmer <cameron@...mon.no> To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com> Subject: Pkzip Hash I am looking at a file that contains a hash produced by zip2john ./file.zip$pkzip$2*2*1*0*8*24*766a*36edfc284d1b1ba0d35f068099947bb13a81d8b6ae0d62c40ae086513fa83b0827b315b6*3*0*1cd331*1d1000*80c8926f*0*39*8*1d*81f4*./file.zip*$/pkzip$ Is this an older hash type? $pkzip$ The zip contains both a zImage and jffs2.img file. I assume the zImage is for Renesas SuperH processors. I’ve tried a couple of known plain text attacks against what I thought the first 12 bytes of the jffs2.img might be, but any advice as to what I might try in terms of brute forcing? Thank you, Cameron
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.