Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <89C023C0-62D2-4774-9814-3B7B508B525F@promon.no>
Date: Fri, 3 Sep 2021 11:42:33 +0000
From: Cameron Palmer <cameron@...mon.no>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Pkzip Hash

I am looking at a file that contains a hash produced by zip2john

./file.zip$pkzip$2*2*1*0*8*24*766a*36edfc284d1b1ba0d35f068099947bb13a81d8b6ae0d62c40ae086513fa83b0827b315b6*3*0*1cd331*1d1000*80c8926f*0*39*8*1d*81f4*./file.zip*$/pkzip$

Is this an older hash type? $pkzip$ 

The zip contains both a zImage and jffs2.img file. I assume the zImage is for Renesas SuperH processors.

I’ve tried a couple of known plain text attacks against what I thought the first 12 bytes of the jffs2.img might be, but any advice as to what I might try in terms of brute forcing?

Thank you,

Cameron

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.