PASSWORD=$(john --show "$HASHFILE" | cut -d: -f2 | head -1)
Using zip2john :
bkcrack -C encrypted.zip -c plaintext_file_inside.zip -p known_plaintext.txt After recovering keys, extract the archive:
zipdetails archive.zip | grep "Compression method" Output should show AES-256 .
zip -e -o archive.zip files/ -P "pass" Then verify encryption type:
echo "[*] Cracking with rockyou.txt..." john --wordlist=/usr/share/wordlists/rockyou.txt "$HASHFILE"
PASSWORD=$(john --show "$HASHFILE" | cut -d: -f2 | head -1)
Using zip2john :
bkcrack -C encrypted.zip -c plaintext_file_inside.zip -p known_plaintext.txt After recovering keys, extract the archive: kali linux zip
zipdetails archive.zip | grep "Compression method" Output should show AES-256 . PASSWORD=$(john --show "$HASHFILE" | cut -d: -f2 |
zip -e -o archive.zip files/ -P "pass" Then verify encryption type: kali linux zip
echo "[*] Cracking with rockyou.txt..." john --wordlist=/usr/share/wordlists/rockyou.txt "$HASHFILE"