How can I get a zip password cracker?

275    Asked by Amitraj in Cyber Security , Asked on Mar 14, 2022

I have some files I was given by my teacher at University. I could chase him up, but I may as well try getting blood from a stone. His response rate isn't great and I completed my degree a year ago!


They're pdf files stored inside password protected zip files. The passwords are networking related, have upper and lowercase and numbers, but no special characters as far as I remember, and some are permutations of each other "passwordL1", "l2Password" etc.


What are the different encryption algorithms employed by .zip files?

How can I determine the protection in use on my zip files? Where can I find good papers and tools, which will ultimately give me back the pdfs which are annoyingly hidden by the password?

Answered by Andrea Bailey

Just wanted to add this method of using fcrackzip CLI tool as a zip password cracker. It's in most Linux distro repos such as Ubuntu & Fedora/CentOS. Using it is pretty straightforward:


$ fcrackzip -b -c a1:$% -l 1-6 -u myencrypted.zip
Options
-b - brute force
-c a1:$% - specifies the character sets to use
-l 1-6 - specifies the length of passwords to try
-u - unzip to weed out wrong passwords
Usage
$ fcrackzip --help
fcrackzip version 1.0, a fast/free zip password cracker
written by Marc Lehmann You can find more info on
http://www.goof.com/pcg/marc/
USAGE: fcrackzip
          [-b|--brute-force] use brute force algorithm
          [-D|--dictionary] use a dictionary
          [-B|--benchmark] execute a small benchmark
          [-c|--charset characterset] use characters from charset
          [-h|--help] show this message
          [--version] show the version of this program
          [-V|--validate] sanity-check the algortihm
          [-v|--verbose] be more verbose
          [-p|--init-password string] use string as initial password/file
          [-l|--length min-max] check password with length min to max
          [-u|--use-unzip] use unzip to weed out wrong passwords
          [-m|--method num] use method number "num" (see below)
          [-2|--modulo r/m] only calculcate 1/m of the password
          file... the zipfiles to crack
methods compiled in (* = default):
 0: cpmask
 1: zip1
*2: zip2, USE_MULT_TAB

Your Answer

Interviews

Parent Categories