How to extract zip?
#1
how i can extract zip information, in order to hashcat could take it and hack the password?
zip - the latest version, hashcat - 3.00 version
thanks
#2
zip2john, but not all zip formats are supported.
#3
(07-27-2016, 07:31 AM)epixoip Wrote: zip2john, but not all zip formats are supported.

What command did you use to crack encrypted zip file?

I tried, but not worked.

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~/hashes/zip2john# zip2john test.zip > test.zip.hash
ver a  efh 5455  efh 7875  test.zip->test PKZIP Encr: 2b chk, TS_chk, cmplen=28, decmplen=16, crc=F30B8770
root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~/hashes/zip2john# hashcat -D 1 --force -w 3 -m 13600 -a 0 test.zip.hash /usr/share/wordlists/rockyou.txt
hashcat (v3.00) starting...

WARNING: Hashfile 'test.zip.hash' on line 1 (test.zip:$pkzip2$1*2*2*0*1c*10*f30b8770*0*3e*0*1c*f30b*495b*14f1b9c5523b908446a836c0ee0f109fdf033eb16a8b360d528c3a4c*$/pkzip2$:::::test.zip): Signature unmatched
Parsed Hashes: 1/1 (100.00%)

ERROR: No hashes loaded     

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~/hashes/zip2john# file test.zip
test.zip: Zip archive data, at least v1.0 to extract
#4
If the hash contains the signature $pkzip2$ it's not supported with hashcat
#5
as usually don't works exactly what i need. any idea what to do with signature $pkzip2$?
#6
really no one idea? don't disappoint poor girl )
#7
Hashcat does not support PKZIP, only ZipCrypto. You can use JTR or something for PKZIP.
#8
Somewhat off topic - but am I correct in understanding that JTR is not GPU accelerated for PKZIP?

If that's correct - then there is no free tool for GPU pkzip password recovery (that I am aware of). Even commercial tools are not viable for licensing in the US due to patent restrictions?

I'm sure this is the reason that the addition of the PKZIP format has been requested for hashcat previously.
#9
PKZIP format is a mess. We looked at implementing it on GPU and it was a bucket of NOPE. I mean we'll eventually need to get around to it, but the LOE is massive.
#10
Ha - ok, understood. We appreciate all the effort thus far...