-
-
Notifications
You must be signed in to change notification settings - Fork 169
Can't quite understand how to use the -x option #140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
To get compressed data manually from content.zip, one way is to open it in an hexadecimal editor and look at bytes following the local file header of content.txt entry. See local file header format: https://en.wikipedia.org/wiki/ZIP_(file_format)#Local_file_header In this exact scenario, there is no point doing this manual work. This is exactly what bkcrack does automatically with options |
If you just want to see how bkcrack behaves with less data, you can truncate how much plaintext it reads from the archive with |
Thank you! Well, that was an example for a more complex case I was trying to understand if it was feasible or not, that is: I would like to extract a deflated binary file (roughly 100-200k) for which I know some parts of the uncompressed plaintext, so I deployed a simple sample case to work on and get to the grips with bkcrack. |
I am playing around with this tool to understand how it works.
Let's say I created a secret.zip file with an older version of WinRar, encrypting a file content.txt it with the password "test"
I also created a not encrypted content.zip with the same method, just no password.
Therefore:
bkcrack.exe -C secret.zip -c content.txt -P content.zip -p content.txt
Will easily find the keys.
Now, since this was so easy I wanted to test using just a portion of the plaintext taken from the content.zip (since the file to crack uses Deflate, right?), so I expected to do:
bkcrack.exe -C secret.zip -c content.txt -x 0 abcdef0123456789whatever
Of course I took the first 100 or 200 bytes from content.zip and it did not work.
But how do I correctly "extract" from content.zip the plaintext bytes to use with -x option in this case?
The text was updated successfully, but these errors were encountered: