Archive
Zip cracking
Fcrackzip
fcrackzip searches each given zipfile for encrypted files and tries to obtain the password. All files must be encrypted with the same password, and the more files you provide, the better.
fcrackzip -u -D -p "$wordlist" "$zipfile"The -u flag will try to decompress the first file by calling unzip with the guessed password. This weeds out false positives when not enough files have been given.
The -D flag selects dictionary mode. In this mode, fcrackzip will read passwords from a file, which must contain one password per line and should be alphabetically sorted.
The -p flag will set initial (starting) password for brute-force searching to string, or use the file with the name string to supply passwords for dictionary searching.
- Examples :
fcrackzip -u -D -p /tmp/wordlists/passwords/password.txt "$zipfile"Uses the wordlist /tmp/wordlists/passwords/password.txt to try to crack the password.
fcrackzip -l 4-8 -u "$zipfile"Brute-forces a password with a length of 4 to 8 characters.
fcrackzip --method cpmask --charset A --init AAAA "$ppmfile"Checks the obscured image test.ppm for all four character passwords.
Archive2hash conversion tools
zip2hashcat, rar2hashcat, 7z2hashcat
zip2hashcat is a tool to convert zip files to a hash that can be cracked with hashcat.
If the password is different between the files in the archive, then it will not work.
zip2hashcat "$zipfile" > "$hashfile"Same for rar2hashcat and 7z2hashcat.
zip2john
Like zip2hashcat but for John the Ripper
zip2john "$zipfile" > "$hashfile"