About Winzip (13600) hash - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: About Winzip (13600) hash (/thread-7968.html) |
About Winzip (13600) hash - Mem5 - 11-20-2018 Hi, I notice a double '*' in the example Winzip hash: $zip2$*0*3*0*b5d2b7bf57ad5e86a55c400509c672bd*d218*0**ca3d736d03a34165cfa9*$/zip2$ When I extract some hashes from zip file, I have some (huge) data betwen those 2. I suppose that the data between those red 2 '*' are useless for cracking purposes? Thank you. RE: About Winzip (13600) hash - DanielG - 11-21-2018 Code: filename:$zip2$*Ty*Mo*Ma*Sa*Va*Le*DF*Au*$/zip2$ From https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/src/zip2john.c, the field DF looks important, but in the example I think it is empty because "Le = real compr len (hex) length of compressed/encrypted data (field DF)" is zero. RE: About Winzip (13600) hash - Mem5 - 11-21-2018 Right, Quote:DF = compressed data DF can be Le*2 hex bytes, and if so, then it is the ENTIRE file blob written 'inline'.So if your zip file is 100 Mb, the hash will be huge for nothing. After testing on multiple zip files, I can say that "DF" part of the hash is useless for hashcat to find the password. |