티스토리 뷰

[h1]Plain text Attack with Pkcrack[/h1]

So you have an encrypted archive, you want to get the files out. Heres the way to do it using pkcrack.

1. Download Pkcrack, unzip the folder to your desktop.

2. put your encrypted archive [i](we're going to call it [b]crypt.zip[/b] )[/i] into your pkcrack folder.

3.Youll need to find a file inside you encrypted archive that you can get a copy of, either from the website, or from google or watever.

-Once you find a file u can duplicate [i](we'll call it [b]photo.jpg[/b])[/i], go ahead and extract it from crypt.zip by using pkcracks extract ability

-Open CMD and cd your way to the pkcrack folder and use this command to extract the file.

[code]extract -p crypt.zip photo.jpg

-Now find out wat method of compression it uses by comparing the uncompressed and compressed version. [i]look at byte size[/i]. Try compressing and uncompressing until you get it right.
( normal, high, low ???? )

Lets say its normal compression

4. Download a copy of [b]photo.jpg[/b] from the website, and place it in your pkcrack folder.

5. Now zip [b]photo.jpg[/b] with normal compression ([b]photo.zip[/b])

6. now time to run the attack


- Open CMD and cd your way to pkcrack folder
- use this command to start the attack

[code] pkcrack -C crypt.zip -c "(path to)"/photo.jpg -P photo.zip -p photo.jpg -d finished.zip [/code]

[b] Variables Explained [/b]
* -C = encrypted archive

* -c = path to encrypted file

* -P = zipped file archive

* -p = plain text file

* -d = Archive to place files in when done


******************

Then when program completes, extract finished.zip and vola you have your files.

[i] Note if unsuccessful, but u get the 3 keys * key0 key1 key2
you will have to run this command, [/i]

[code] decrypt crypt.zip key0 key1 key2 [/code]

*******************

I think thats it, i hope that helps and i got everything right, if not , Dont bash just let me know.

-Joey

Information taken from [url=http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html] PkCrack's Website[/url]

'기억하자정보 > 보안' 카테고리의 다른 글

SQL 인젝션 예  (0) 2012.12.13
HTTP Session Hijacking  (0) 2006.10.14
[hackthissite]Realistic 13 tutorial  (0) 2006.10.12
업로드 취약점!  (0) 2006.10.11
웹해킹 - SQL 인젝션  (1) 2006.10.10
댓글
안내
궁금한 점을 댓글로 남겨주시면 답변해 드립니다.