Skip to content

zip2.0 cracking dependency on payload length #55

@Epivalent

Description

@Epivalent

hi, just wondering if performance should be expected to be poor when attempting to crack a zipcrypted single-file archive where the inner file is very long (37gb).

does hashkill's zip module do the full naive decrypt, inflate, crc32 or is there some heuristic distinguisher of valid deflate streams that can abort early on incorrect guesses?

how hard might this functionality be to implement if it does not yet exist?

further, how difficult would it be to modify hashkill for distributed cracking with a variable workforce, coordinated over a website or something? at a guess, you could do some kind of dynamic reallocation using the json statefiles and some extra helper process to consolidate completed portions of the guess space.

best regards,
-nsh

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions