Results 1 to 5 of 5

Thread: Zip Protection Question?

  1. #1
    foxthree
    Guest

    Zip Protection Question?

    Hiya Mike and others:

    I know that there was a detailed thread on ZIP Password protection and stuff and Mike, I read through your paper. However, one question intrigues me:

    Say I have a zip file and I know a part of the password. I just don't know the length of the password and whether this "crib" occurs in that password. Can I exploit this information somehow?

    To be clear:

    Say I have a zip: ultrasecret.zip and I know that the contents of the zip file have been protected with a password that contains the word: "hallow". I don't know the exact length of the password and neither where the word occurs in the password. For instance, the password may be "shallow" or "hallowed" Get it?

    Can I exploit this information some how and reduce my search space?

    The first idea I can think of is to write some fuzzifier that would create all possible strings at a specified length which contains the words "hallow" and attempt a dictionary attack. But anything else other than this?

    Thanks for your time and research folks,

    Signed,
    -- FoxThree

    Ummm and one more thing:

    Mike: Pls refer to:
    http://www.woodmann.net/forum/showthread.php?s=&threadid=1965&highlight=accessdata

    In which you've mentioned about an essay posted on Fraiva in March. Do you still have it and can you upload it if you have it? I hope this is different from the one that I found on your website? Also, I'm currently going through Biham/Kochers' paper on ZIP Plaintext attack. Pretty interesting
    Last edited by foxthree; August 11th, 2002 at 18:59.
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  2. #2
    foxthree
    Guest

    Yoohoo...

    Mike:

    Any responses ???

    Signed,
    -- FoxThree
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  3. #3
    הבּרוּ נשׂאי כּלי יהוה mike's Avatar
    Join Date
    Mar 2001
    Posts
    491
    Sorry, didn't read the board yesterday.

    http://www.woodmann.net/fravia/mike_zipattacks.htm

    is the paper; it's almost identical to the one on my site. There are three ways to attack a zip file: dictionary, my attack for winzip-like zippers, and Kocher's attack for all zippers.

    You know how a dictionary attack works.

    Both my attack and kocher's attack try to figure out what the internal state of the cipher is *AFTER* the password has been mixed in. Basically, mine uses the broken PRNG to get known plaintext, and Kocher uses known plaintext that you give it.

    So our attacks don't care what password you use, and can't do anything with information about it. I think some of the commercial zip crackers have custom settings where you can configure the words that it generates--your "fuzzifier."

    My attack can tell you within a few seconds whether it will work or not: it looks to see if you have five or six files in the archive that were all added at once.
    Last edited by mike; August 15th, 2002 at 22:23.

  4. #4
    foxthree
    Guest

    Why?

    Hi Mike:

    I just now decrypted an encrypted archive using Guaranteed Zip Recovery algorithm (ARCHPRs' after unpaxing and regging it ). However, the funny thing was that my test archive gave me the actual password itself. But the actual archive only got me the three 32-bit keys. It said it couldn't find the actual password used to encrypt the files.

    Anywayz, the archive is decrypted and that's what matters. But just curious? Any ideas why it couldn't find the acutal password?

    BTW, this board OwnZ elc****** ...

    Signed,
    -- FoxThree
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  5. #5
    הבּרוּ נשׂאי כּלי יהוה mike's Avatar
    Join Date
    Mar 2001
    Posts
    491
    For a detailed explanation, look at biham & kocher's paper. In a nutshell, it's that there are three checksums of the password involved (thus three 'keys') and all three have to match to decrypt right. If you can figure out the checksums instead of the password, you can decrypt. The problem is finding the password given the initial states and final states of the checksums. It's basically brute-force, but you get 4 characters free.

Similar Threads

  1. Protection
    By jaygee in forum Plugins (General)
    Replies: 1
    Last Post: July 9th, 2005, 16:21
  2. Impossible Protection?
    By vikingp in forum The Newbie Forum
    Replies: 8
    Last Post: April 24th, 2005, 23:04
  3. Protection plus
    By Omnibus in forum Malware Analysis and Unpacking Forum
    Replies: 1
    Last Post: June 29th, 2004, 22:33
  4. DialCops Protection
    By THORAC in forum The Newbie Forum
    Replies: 8
    Last Post: October 22nd, 2003, 09:02
  5. Protection
    By ThrawN in forum Advanced Reversing and Programming
    Replies: 8
    Last Post: May 13th, 2002, 10:11

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •