foxthree
August 11th, 2002, 18:51
Hiya Mike and others:
I know that there was a detailed thread on ZIP Password protection and stuff and Mike, I read through your paper. However, one question intrigues me:
Say I have a zip file and I know a part of the password. I just don't know the length of the password and whether this "crib" occurs in that password. Can I exploit this information somehow?
To be clear:
Say I have a zip: ultrasecret.zip and I know that the contents of the zip file have been protected with a password that contains the word: "hallow". I don't know the exact length of the password and neither where the word occurs in the password. For instance, the password may be "shallow" or "hallowed" Get it?
Can I exploit this information some how and reduce my search space?
The first idea I can think of is to write some fuzzifier that would create all possible strings at a specified length which contains the words "hallow" and attempt a dictionary attack. But anything else other than this?
Thanks for your time and research folks,
Signed,
-- FoxThree
Ummm and one more thing:
Mike: Pls refer to:
http://www.woodmann.net/forum/showthread.php?s=&threadid=1965&highlight=accessdata
In which you've mentioned about an essay posted on Fraiva in March. Do you still have it and can you upload it if you have it? I hope this is different from the one that I found on your website? Also, I'm currently going through Biham/Kochers' paper on ZIP Plaintext attack. Pretty interesting
I know that there was a detailed thread on ZIP Password protection and stuff and Mike, I read through your paper. However, one question intrigues me:
Say I have a zip file and I know a part of the password. I just don't know the length of the password and whether this "crib" occurs in that password. Can I exploit this information somehow?
To be clear:
Say I have a zip: ultrasecret.zip and I know that the contents of the zip file have been protected with a password that contains the word: "hallow". I don't know the exact length of the password and neither where the word occurs in the password. For instance, the password may be "shallow" or "hallowed" Get it?
Can I exploit this information some how and reduce my search space?
The first idea I can think of is to write some fuzzifier that would create all possible strings at a specified length which contains the words "hallow" and attempt a dictionary attack. But anything else other than this?
Thanks for your time and research folks,
Signed,
-- FoxThree
Ummm and one more thing:
Mike: Pls refer to:
http://www.woodmann.net/forum/showthread.php?s=&threadid=1965&highlight=accessdata
In which you've mentioned about an essay posted on Fraiva in March. Do you still have it and can you upload it if you have it? I hope this is different from the one that I found on your website? Also, I'm currently going through Biham/Kochers' paper on ZIP Plaintext attack. Pretty interesting


). However, the funny thing was that my test archive gave me the actual password itself. But the actual archive only got me the three 32-bit keys. It said it couldn't find the actual password used to encrypt the files.