You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Deflated plaintext can be extracted (without inflating) from encrypted archive using bkcrack -C ./foo.zip -c bar.xml -d barxml.bin --password password
But how to do that with unencrypted archive? Trying same with --password '' gives me Zip error: entry "bar.xml" is not encrypted.
This route would potentially allow for identifying used deflate algorithm and parameters like compression level - assuming settings were the same between encrypted and unencrypted archives (so one plaintext to identify encrypted zip details, and another for known inflated file, that is deflated inside encrypted archive)
The text was updated successfully, but these errors were encountered:
That is not implemented at the moment. I did that a couple of times manually with an hexadecimal editor so I agree it would be a nice feature. Thank you for the suggestion. Let's leave this issue open to remember it.
Deflated plaintext can be extracted (without inflating) from encrypted archive using
bkcrack -C ./foo.zip -c bar.xml -d barxml.bin --password password
But how to do that with unencrypted archive? Trying same with
--password ''
gives meZip error: entry "bar.xml" is not encrypted.
This route would potentially allow for identifying used deflate algorithm and parameters like compression level - assuming settings were the same between encrypted and unencrypted archives (so one plaintext to identify encrypted zip details, and another for known inflated file, that is deflated inside encrypted archive)
The text was updated successfully, but these errors were encountered: