For the background story, I'll just quote the original topic at the Lost Levels forums: The password for the other file has been recently cracked, but the file keeps giving a CRC error before anybody can extract a thing. Perhaps somebody here can recover at least parts of it, so here's said compressed file (password: i9KKs9s).
WinRAR spits out a "wrong password" error, maybe it's right? Edit: Windows default ZIP program also says it's the incorrect password. I've been running a password recovery program on this for the last 8 hours. I'm also going to try and run this though some zip recovery programs and see if I can get anything that way.
I hate it when people password protect compressed files. Its really annoying because I usually have to go through a lot of trouble to find the said password unless its given to me right off the bat.
Occasionally, you can get false positives, too. I ran a password cracker on a file once and it got something that got past the password prompt but still wasn;t the right password. I'd recommend running the cracker again but ignore that one result.
I agree. I tried over 9000 different Linux tools and didn't get very far. I got maybe 18 bytes of the file to extract, and it was probably just garbage that the stupid archiver generated.
I'd be glad to help at cracking this password but only if we can organize ourselves on how to do it. For example, if I start my cracker right now, it would start from "A" -> "Z" then "AA" -> "ZZ" and so on (of course there are also the numbers and so on, this is just an example), and since most crackers do it in the same way it would just be a waste of time since I'd rescan passwords already scanned by someone else. If we can organize ourselves like: (1) I do "AAAAAAA" to "LZZZZZZ" and (2) I do "MAAAAAA" to "ZZZZZZZ", then I'd be in.
Well seeing as i9KKs9s is the collision password, first step would be to start at next one after that. Would have to guess on the charset though... [a..z,A..Z,0..9] would be my guess. Also there are tools that use CUDA for better speed, should be using that.
I have a Core i7 with an ATI HD4890 that will be idling for the next few weeks. If someone can link me to a decent freeware ZIP password brute forcer (preferably GPGPU accelerated), I'd be glad to put it to use.
I'm running an "all caps + all small" attempt. Turns out I forgot to include numerals. Oh well, I'll have the results by tomorrow morning if all goes well. EDIT: No dice. I'm running it with numerals from the given password now. If that doesn't net me anything then I'll probably just run a search up to the given password. This is going to take up to three days at max mind you. If we had enough people we could probably go with nineko's method, which would be a hell of a lot faster, but it doesn't seem like anyone's too interested to do so. :/
I've been running it for a while. I'm around 4xxxxxx with no luck yet. My computer isn't the best, so this could take weeks for me finish just the 7 character long password check.
I'm on the yXXXXXX's at 81% with 9h 18m to go. I'll be sure to update you guys on my findings as soon as I can. Again, if this fails, I'll just start from the beginning and work up to the supposed false positive. I guess if everything fails, we could boost it up to max char sets including spaces and special symbols, but then I would strongly suggest we do the team division method. I'm sure it would take over a week to crack a pass using those by one's self.
So, what tools are you guys using? I've found two freeware ZIP password crackers, but not of them are multithreaded or GPGPU accelerated. EDIT: I don't know what you guys are using, but I got Elcomsoft's Advanced Archive Password Recovery. I've checked all passwords with up to 5 character with the full charset, and it's currently doing this for all 6 character passwords as well (4.5 hours left).
That's what I'm using, though mine's not the demo version. Well. I got nothing. Looks like I'll be running it up to our false positive today.
Been running for 20 minutes so far, nothing; I'm going to keep it on until I get the new PSU in and have to install that and the 5770.
Couldn't one work some magic with zlib or whatever and force extract this? I don't really understand any of the compression libraries yet, but is it feasible?
The zip is encrypted using the password as a key. If it just refused to open the file, a non-standards-adherent .zip client would work.
I'll be honest... I've never heard of a case where someone force extracted a password encrypted .zip. It may be feasible, but I really have no idea... As for my current status, I'm on the CXXXXXX's with 1d2h28m to go. :/