⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 fcrackzip.1

📁 解加密的zip文件的密码的程序
💻 1
字号:
.TH FCRACKZIP 1 "Free/Fast Zip Password Cracker".SH NAME.I fcrackzip\- a Free/Fast Zip Password Cracker.SH SYNOPSIS.B fcrackzip[-bDBchVvplum2] [--brute-force] [--dictionary] [--benchmark] [--charset characterset][--help] [--validate] [--verbose] [--init-password string/path] [--length min-max][--use-unzip] [--method name] [--modulo r/m] file....SH DESCRIPTION.I fcrackzipsearches each zipfile given for encrypted files and tries to guess thepassword. All files must be encrypted with the same password, the morefiles you provide, the better..SS OPTIONS.TP.B \-h, \--helpPrints the version number and (hopefully) some helpful insights..TP.B \-v, \--verboseEach -v makes the program more verbose..TP.B \-b, \--brute-forceSelect brute force mode. This tries all possible combinationsof the letters you specify..TP.B \-D, \--dictionarySelect dictionary mode. In this mode, fcrackzip will read passwordsfrom a file, which must contain one password per line and should bealphabetically sorted (e.g. using \fBsort(1)\fR)..TP.B \-c, \--charset characterset-specificationSelect the characters to use in brute-force cracking. Must be oneof.nf  a   include all lowercase characters [a-z]  A   include all uppercase characters [A-Z]  1   include the digits [0-9]  !   include [!:$%&/()=?{[]}+*~#]  :   the following characters upto the end of the spe-      cification string are included in the character set.      This way you can include any character except binary      null (at least under unix)..fiFor example, a1:$% selects lowercase characters, digits and the dollar andpercent signs..TP.B \-p, \--init-password stringSet initial (starting) password for brute-force searching to \fIstring\fR,or use the file with the name \fIstring\fR to supply passwords for dictionarysearching..TP.B \-l, \--length min[-max]Use an initial password of length min, and check all passwordsupto passwords of length max (including). You can omit the maxparameter..TP.B \-u, \--use-unzipTry to decompress the first file by calling unzip with the guessedpassword. This weeds out false positives when not enough files havebeen given..TP.B \-m, \--method nameUse method number "name" instead of the default cracking method. Theswitch \fB--help\fR will print a list of available methods. Use\fB--benchmark\fR to see which method does perform best on yourmachine. The \fBname\fR can also be the number of the method to use..TP.B \-2, \--modulo r/mCalculate only r/m of the password. Not yet supported..TP.B \-B, \--benchmarkMake a small benchmark, the output is nearly meaningless..TP.B -V, \--validateMake some basic checks wether the cracker works..SH ZIP PASSWORD BASICSHave you ever mis-typed a password for unzip? Unzip reacted pretty fast with\'incorrect password\', \fIwithout\fR decrypting the whole file. While theencryption algorithm used by zip is relatively secure, PK made cracking easyby providing hooks for very fast password-checking, directly in the zipfile. Understanding these is crucial to zip password cracking:For each password that is tried, the first twelve bytes of the file aredecrypted. Depending on the version of zip used to encrypt the file (more onthat later), the first ten or eleven bytes are random, followed by one ortwo bytes whose values are stored elsewhere in the zip file, i.e. are knownbeforehand. If these last bytes don't have the correct (known) value, thepassword is definitely wrong. If the bytes are correct, the password\fImight\fR be correct, but the only method to find out is to unzip the fileand compare the uncompressed length and crc\'s.Earlier versions of pkzip (1.xx) (and, incidentally, many zip clones forother operating systems!) stored two known bytes. Thus the error rate wasroughly 1/2^16 = 0.01%. PKWARE \'improved\' (interesting what industry callsimproved) the security of their format by only including one byte, so thepossibility of false passwords is now raised to 0.4%. Unfortunately, thereis no real way to distinguish one byte from two byte formats, so we have tobe conservative..SH BRUTE FORCE MODEBy default, brute force starts at the given starting password, andsuccessively tries all combinations until they are exhausted, printing allpasswords that it detects, together with a rough correctness indicator.The starting password given by the \fI-p\fR switch determines the length.fcrackzip will not currently increase the password length automatically, unlessthe \fI-l\fR switch is used..SH DICTIONARY MODEThis mode is similar to brute force mode, but instead of generating passwordsusing a given set of characters and a length, the passwords will be read froma file that you have to specify using the \fI-p\fR switch..SH CP MASKA CP mask is a method to obscure images or parts of images using apassword.  These obscured images can be restored even when saved as JPEGfiles. In most of these files the password is actually hidden and canbe decoded easily (using one of the many available viewer and maskingprograms, e.g. xv). If you convert the image the password, however, islost. The \fBcpmask\fR crack method can be used to brute-force theseimages. Instead of a zip file you supply the obscured part (and nothingelse) of the image in the \fBPPM\fR-Image Format (\fBxv\fR and otherviewers can easily do this).The \fBcpmask\fR method can only cope with password composed of uppercaseletters, so be sure to supply the \fB--charset A\fR or equivalent option,together with a suitable initialization password..SH EXAMPLES.TP.B fcrackzip -c a -p aaaaaa sample.zipchecks the encrypted files in sample.zip for all lowercase 6 characterpasswords (aaaaaa ... abaaba ... ghfgrg ... zzzzzz)..TP.B fcrackzip --method cpmask --charset A --init AAAA test.ppmchecks the obscured image \fBtest.ppm\fR for all four character passwords.-TP.B fcrackzip -D -p passwords.txt sample.zipcheck for every password listed in the file \fBpasswords.txt\fR..SH PERFORMANCE\fIfzc\fR, which seems to be widely used as a fast password cracker,claims to make 204570 checks per second on my machine (measured under plaindos w/o memory manager).\fIfcrackzip\fR, being written in C and not in assembler, naturallyis slower. Measured on a slightly loaded unix (same machine), it\'s 12percent slower (the compiler used was \fIpgcc\fR, from\fBhttp://www.gcc.ml.org/\fR).To remedy this a bit, I converted small parts of the encryption core to x86assembler (it will still compile on non x86 machines), and now it\'s about4-12 percent faster than \fIfzc\fR (again, the \fIfcrackzip\fR performancewas measured under a multitasking os, so there are inevitably somemeaurement errors), so there shouldn't be a tempting reason to switch toother programs.Further improvements are definitely possible: \fIfzc\fR took 4 years to getinto shape, while fcrackzip was hacked together in under 10 hours. And not toforget you have the source, while other programs (like \fIfzc\fR), even comeas an \fIencrypted .exe\fR file (maybe because their programmers are afraidof other people could having a look at their lack of programming skills?nobody knows...).SH RATIONALEThe reason I wrote \fIfcrackzip\fR was \fBNOT\fR to have the fastest zipcracker available, but to provide a \fIportable\fR, \fIfree\fR (thus\fIextensible\fR), but still \fIfast\fR zip password cracker. I was reallypissed of with that dumb, nonextendable zipcrackers that were either slow,were too limited, or wouldn't run in the background (say, under unix). (Andyou can't run them on your superfast 600Mhz Alpha)..SH BUGSNo automatic unzip checking..PPStop/resume facility is missing..PPShould be able to distinguish between files with 16 bit stored CRC\'s and 8bit stored CRC\'s..PP\The benchmark does not work on all systems..PPIt's still early alpha..PPMethod "cpmask" only accepts ppms..PPCould be faster..SH AUTHOR\fIfcrackzip\fR was written by Marc Lehmann <pcg@goof.com>. The main\fIfcrackzip\fR page is at \fBhttp://www.goof.com/pcg/marc/fcrackzip.html\fR)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -