Not All ZIP Files Are Equal

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 พ.ย. 2024

ความคิดเห็น • 69

  • @lumin0l161
    @lumin0l161 ปีที่แล้ว +27

    Awesome tutorial John. This is exactly the kind of thing I would expect to find in a CTF. I’ll add it to the armoury!

  • @phill030
    @phill030 ปีที่แล้ว +66

    This only works for old ZIP-2.0 Encryption, which already won't be used anymore & is only for very old .zip files

    • @Kattakam
      @Kattakam ปีที่แล้ว +9

      Think we saw 30 year old vulns from poor admins that just used what was laying around. A low tech sysadmin getting paid low dollar at the brick-n-mortar shop setting up a NAS solution on the cheep. The owner still has old windows that’s being used for everything in the store and taxes with no internet (because that’s unsafe right..and if they don’t connect then they are safe from malicious activities), thinks it’s ok to upgrade not knowing the usb he’s using to zip his tax files to is vuln to ..everything. Easy scenario

    • @xlukas1337
      @xlukas1337 ปีที่แล้ว +8

      That's literally what he said in the first few minutes

    • @Mr.Anders0n_
      @Mr.Anders0n_ ปีที่แล้ว +1

      The whole thing is a very convoluted scenario to make this info seem more useful than it really is 🤷🏻‍♂️

    • @seansingh4421
      @seansingh4421 ปีที่แล้ว +1

      @@Kattakamactually that would be a very unusual scenario considering so many things

    • @ClassicRiki
      @ClassicRiki ปีที่แล้ว

      ⁠@@Kattakamyeah but your scenario (while technically plausible) is like saying…the same person did everything perfectly but someone pointed something sharp at him and he would tell them the password; thus bypassing all encryption on the planet…so his perfectly implemented system would be vulnerable to..everything. No difference other than that my scenario will work even when more secure encryption standards are used in the future. Ultimately it’s a moot point.

  • @jeremy0705
    @jeremy0705 ปีที่แล้ว +1

    So happy I ran into John at RSA! Such a big fan of your work. Keep it up, you’re providing an invaluable service to the community 💪🏻

  • @yodamiszcz7831
    @yodamiszcz7831 ปีที่แล้ว +23

    Actually you can crack copressed archives. You need to know at least one whole file from the archive, like README or LICENCE, and compress it using same method as original archive and then use it as plaintext for tha attack. Also you can apply offsets so you can get 12 bytes from diffrent parts of the file and even use one bonus byte from crc. I wrote detailed post about it on medium some time ago.

    • @0xhhhhff
      @0xhhhhff ปีที่แล้ว

      link or atleast title of it?

    • @yodamiszcz7831
      @yodamiszcz7831 ปีที่แล้ว +4

      @@0xhhhhff I can't paste it here, there were three comments of mine which were deleted so far

    • @yodamiszcz7831
      @yodamiszcz7831 ปีที่แล้ว

      @@0xhhhhff google keeper772 medium you should find it, I hope it wont be deleted

    • @pycz
      @pycz ปีที่แล้ว

      Wow! A workaround should be to put archive in an another archive to make sure that attacker do not know a file in an archive.

    • @pycz
      @pycz ปีที่แล้ว

      Well, maybe attacker could use zip header in this case, so not so secure workaround after all...

  • @lancemarchetti8673
    @lancemarchetti8673 ปีที่แล้ว +2

    Cool video John!
    I'm currently working on a method that locks the password field of protected archived files like zip 7z Rar.
    So basically, even if the correct password is uncovered with tools like Hashcat, the password field remains locked.
    The user needs to provide a BOM-key to reactivate the password box, In order for the initial password to work.
    I've tested it with only a single_character password, which is quite crazy.
    For now I've named this method BOMSec which stands for Byte Order Manipulation Security.
    I am currently not aware of any RE method or tool that is able to crack a randomly manipulated sequence of bytes in a locked archive.
    Considering that there's no algorithm involved, eliminating the possibility of a distinguishable obfuscation pattern.
    When all testing is complete I'll provide a link for humans to try and smash the archive examples open.
    Because AI at this point struggles to comprehend my method and ranks it as _unethical_,.... not kidding.
    😂

  • @logiciananimal
    @logiciananimal ปีที่แล้ว +6

    That's really weird that the zip library defaults to "store". Why??

    • @mario50000
      @mario50000 ปีที่แล้ว +1

      It does not, you misunderstood

  • @LaserFur
    @LaserFur ปีที่แล้ว +14

    But if you have the entire known file you could compress it with the same compression as the one in the file and then do a plain text attack. I hope the newer zip standards include a salt with the AES system. PS: if you use AES256 using winzip the resulting file can't be unzipped by windows explorer if that system also does not have winzip.

    • @pycz
      @pycz ปีที่แล้ว

      Wow! Another workaround should be to put archive in an another archive to make sure that attacker do not know a file in an archive.

    • @pycz
      @pycz ปีที่แล้ว

      Well, maybe attacker could use zip header in this case, so not so secure workaround after all...

  • @boggavarapuramsaransaisrin9316
    @boggavarapuramsaransaisrin9316 ปีที่แล้ว +10

    Hi John, could you please make a video on how to identify encryption algorithms like AES, cha cha and other during malware reversing.

  • @jrnvnjk
    @jrnvnjk ปีที่แล้ว

    Since it's a little bit in the same direction. I once had a customer with an excelsheet with macro's, these macro's were password protected with an unknown password. Since office files essentially are compressed folders, i had to unpack it and change 1 byte, repack it and the password is removed. Then i could access the macro's and make changes to it.

  • @wrathofainz
    @wrathofainz ปีที่แล้ว +3

    Last time I tried to work with zip files in python I was disappointed because it can't deal with AES encryption without libraries.
    I feel like maybe this sort of thing could work using just the file headers of knon filetypes like mp4. Decrypt by bruteforce until you see a valid header then try the whole file. Maybe certain encryption methods aren't susceptible to that, idk. Just a thought.

  • @terry.chootiyaa
    @terry.chootiyaa ปีที่แล้ว +1

    *You never explained mitigation ...how do we protect our passworded files from hackers ?*

  • @southilgurl2003
    @southilgurl2003 ปีที่แล้ว

    Something one of my CS professors used to like to say: you can encrypt your compression, but if you can compress your encrypted files, you failed.

  • @realatomizer
    @realatomizer ปีที่แล้ว

    giving a like in the ads... Everybody should know.

  • @JeturGavli
    @JeturGavli 2 หลายเดือนก่อน

    😂😂🤣🤣 Shift + Del = you got password for life time

  • @RealWorldPortal464
    @RealWorldPortal464 ปีที่แล้ว +1

    can we track exact location of mobile phone using imei number

  • @blinking_dodo
    @blinking_dodo ปีที่แล้ว +1

    Attempt 2: There is an onion url routed to the localhost ip.
    Why though? 🤔

  • @ivansmitt2195
    @ivansmitt2195 ปีที่แล้ว

    what python code you used to create encrypted zip? cause zipfile doesnt support creating archived zip files, it only supports extracting zip with pwd

  • @mailoisback
    @mailoisback ปีที่แล้ว

    So how does it work?

  • @CypherX-Sec
    @CypherX-Sec ปีที่แล้ว +4

    Hii John love from India ❤

  • @jmtradbr
    @jmtradbr ปีที่แล้ว

    Zip is a very old format using old security protocols. So of couse people can brite force it.

  • @MarquiseSanchez-z8w
    @MarquiseSanchez-z8w ปีที่แล้ว

    I've never used zip archive cuz I know some tricks to unlock it like this one you've showcasing. I liked this one specifically. So I'm using rar archive instead. any cracking method for rar archive ???

  • @hackbustersminecraft
    @hackbustersminecraft ปีที่แล้ว +1

    Peazip mentioned

  • @therealb888
    @therealb888 ปีที่แล้ว

    I might finally be able to recover my first archives of prawn.
    Edit: May be not. Gonna have to wait for quantum computers.

  • @MikeHarness
    @MikeHarness ปีที่แล้ว +2

    The password is "infected", duh. /s

  • @xanderlastname3281
    @xanderlastname3281 ปีที่แล้ว

    Ok so this only works with plaintext or something right? And only KNOWN plaintext.
    So the hundreds of random mp4s that I uploaded to some sketchy website in a .zip are safe right? Store, but set with a password and encrpt filenames.
    Though I an seeing people saying that it only works on older zip files, and I zipped them like a month ago so im probably good

    • @terry.chootiyaa
      @terry.chootiyaa ปีที่แล้ว +1

      You may be fooked

    • @ichigonixsun
      @ichigonixsun ปีที่แล้ว

      You could theoretically use the MP4 header as a known plaintext

    • @xanderlastname3281
      @xanderlastname3281 ปีที่แล้ว

      @@ichigonixsun noooooooooooooo

  • @h4ckh3lp
    @h4ckh3lp ปีที่แล้ว

    Moar practical technique like this, please! Not necessarily cracking, but any actionable methodologies like this

  • @romanemul1
    @romanemul1 ปีที่แล้ว +3

    passworded zip file ? Shift + Del. Problem solved

  • @stephaniehumphries
    @stephaniehumphries ปีที่แล้ว

    Nice tutorial John thankyou so much 😘

  • @nihaltiwari3474
    @nihaltiwari3474 ปีที่แล้ว

    Awesome, thanks for this amazing tutorial. Are there any tools for .xlsx files?

  • @thefoxguy
    @thefoxguy ปีที่แล้ว +1

    i mean you could have made this video like 3 minutes long or maybe 4 mins long, idk why it is 13 mins but yeah, just some feedback.
    i am sorry but my attention span just drifted off watching this vid.
    i am just leaving a like and a comment to still support u since i like ur vids :)

  • @joshallen128
    @joshallen128 ปีที่แล้ว

    Thats why I use 7-zip

  • @hikenroot6378
    @hikenroot6378 ปีที่แล้ว

    Merci pour la vidéo toujours perspicace

  • @madfangkills
    @madfangkills ปีที่แล้ว

    It bugs me that you didn't pay for WinRAR 👀

  • @DeborahLong7777
    @DeborahLong7777 ปีที่แล้ว

    Is windows 11 safe? I understand it is more difficult 😕

    • @terry.chootiyaa
      @terry.chootiyaa ปีที่แล้ว +1

      Nah ! It's rubbish go back to windows 95

  • @Dahlah.FightMe
    @Dahlah.FightMe ปีที่แล้ว +1

    Nice :D

  • @blinking_dodo
    @blinking_dodo ปีที่แล้ว

    Why is my comment gone?

  • @colt2356
    @colt2356 ปีที่แล้ว

    Does this exploit work on .7z archives that use the store method?

  • @blackhat5133
    @blackhat5133 ปีที่แล้ว +1

    ❤❤

  • @venomx2131
    @venomx2131 ปีที่แล้ว

    Sir, please tell me how to upload hacking videos. My videos are being removed by TH-cam due to community guidelines

  • @dydarjadmin
    @dydarjadmin ปีที่แล้ว +1

    😮 о да

  • @hackwithprogramming7849
    @hackwithprogramming7849 ปีที่แล้ว

    People who came from CTF 😂😂😂😂

  • @DELvEK
    @DELvEK ปีที่แล้ว

    I dont understand why It took so many years for someone to actually show a glimpse of how to crack zip/rar password protected files. Since It is possible for more than 10years already xD
    Its always fake software to "bruteforce" or suggesting to magicaly find the pwd. omg xD

  • @abepl
    @abepl ปีที่แล้ว

    I'm not a haker, but I forgot once password to my zip folder, I literally googled "how to write password breaker in python", I dont know how to code either, but it was right there to download, then i had to learn how to use python. and Then i asked a friend who knows how to use it, to code it for me cuz im an idiot. and it worked!

  • @gangsterism
    @gangsterism ปีที่แล้ว

    har

  • @KramerEspinoza
    @KramerEspinoza ปีที่แล้ว

    ZIP is junk

  • @GebzNotJebz
    @GebzNotJebz ปีที่แล้ว

    quite obscure video if I'm honest.. not the quality content you used to make back in the day sorry to say.

    • @_JohnHammond
      @_JohnHammond  ปีที่แล้ว

      What's different?

    • @GebzNotJebz
      @GebzNotJebz ปีที่แล้ว

      Delivery format/topic. This is nothing like the malware analysis videos you used to make a while ago. I actually used to binge watch these because they were enjoyable and quite useful. @@_JohnHammond

  • @markc6714
    @markc6714 ปีที่แล้ว

    Down vote. Forced ads

  • @greob
    @greob ปีที่แล้ว

    Please don't use distracting music in the background. Plain voice is much better.