Re: Re: New Objectives. Thursday, 11-Feb-99 14:20:49
Hi all... I'm new here and thought I would throw in my 2 cents worth (actually less :-). The ZIP file headers can absolutely be something worth looking into. Haven't been to the site yet but if they tell me what I need I think I actually have a possible way of getting around the password with some hack'n'slashing. This might be either some very old news to ya (then I'm sorry, but once again I'm very new to this) or considered a lousy way of doing it then I'm also sorry for the same reason. This is what I gotta say: I zipped two files, exactly same file, one with password, one without. Comparing these files I found some very interesting information in the three PK headers. First of all the password (unless it's used with the encryption algorithm then you can stop reading 'cause this won't work), the byte which tells the 'mode' of encryption (how encrypted, with/without pwd), the size of all the headers and some other stuff I haven't actually ID'ed yet. Therefore it's going to be very interesting to look at the site. However on the pwd protected file I removed the password, changed the mode byte and the sizes of the headers and voilá I could easily extract it. Note however that this experiment was made on 0 byte file which doesn't mean it would work in 'reality'. When I tried the same on the project file I get a inconsistent header and failed CRC check. That can be caused by two things: I calculated the headers wrongly or I'm running my head bloddy against a wall. If you know which please let me know. :-) If I have posted this in the wrong place or are way out of something (I usually are) then I apologize in beforehand and so on and hope that no one get's to pissed. I'm very new on cracking and very eager to learn more so if you have some pointers please send 'em my way :-) // Gazzaud R. G. Gazzaud |
New Objectives. (Eternal Bliss) (10-Feb-99 13:47:42) |