-
Notifications
You must be signed in to change notification settings - Fork 47
Open
Description
hi, just wondering if performance should be expected to be poor when attempting to crack a zipcrypted single-file archive where the inner file is very long (37gb).
does hashkill's zip module do the full naive decrypt, inflate, crc32 or is there some heuristic distinguisher of valid deflate streams that can abort early on incorrect guesses?
how hard might this functionality be to implement if it does not yet exist?
further, how difficult would it be to modify hashkill for distributed cracking with a variable workforce, coordinated over a website or something? at a guess, you could do some kind of dynamic reallocation using the json statefiles and some extra helper process to consolidate completed portions of the guess space.
best regards,
-nsh
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels