7zip archives under attack!
Dmitry
Posted on September 3, 2018
Notice! This article is for folks who are familiar with BASH-console a bit.
If you feel you do not realize how it works let me know in comments please!
I think that one from my mind is correct, I just need to try all those two hundred ones!
Does that remember you anything?
Sometime people face situation they do not remember the password on an archive, but at the same time they remember that is sort of simple one.
Sometime we know that the password is one of those couples in our mind, but we do not remember which exactly!
For such cases it would be good to have some mechanism or practice to find out the correct one, so that means we need to think about it and produce a solution!
In this article I will show you how an archive could be attacked using 7zip command-line interface without many efforts.
The first thing we need to think about is how many passwords we remember.
Let us say we remember ten of those, that means we need to arrange a list of those.
password
makemoneymonkey
...
Okay, let us say we have needed file and it already contains all needed passwords you could remember.
Then we have to use this file in conjunction with 7zip command-line interface.
All what we got to do in this case is just running the following script from a folder you have an archive that is going to be attacked using that dictionary.
Okay, let us see how it works in real life!
I have already prepared a script that allows us to run 7zip command-line interface against each password, check it out here:
#!/bin/bash
passwords_list="passwords-list"
archive=$1
echo "Starting attacking"
while IFS='' read -r line_data; do
result=$(7z t $archive -p"$line_data" 2> /dev/null | grep -o "is Ok")
if [[ $result ]]; then
echo "Excellent! Password is $line_data"
exit
fi
done < $passwords_list
echo "Sorry we didn't find any appropriate password :-("
Please let me know whether this article has been helpful or not
Posted on September 3, 2018
Join Our Newsletter. No Spam, Only the good stuff.
Sign up to receive the latest update from our blog.