一、使用fcrackzip破解
root@kali:~# fcrackzip --help fcrackzip version 1.0, a fast/free zip password cracker written by Marc Lehmann <[url=mailto:pcg@goof.com]pcg@goof.com[/url]> You can find more info on [url=http://www.goof.com/pcg/marc/]http://www.goof.com/pcg/marc/[/url] USAGE: fcrackzip [-b|--brute-force] use brute force algorithm [-D|--dictionary] use a dictionary [-B|--benchmark] execute a small benchmark [-c|--charset characterset] use characters from charset [-h|--help] show this message [--version] show the version of this program [-V|--validate] sanity-check the algortihm [-v|--verbose] be more verbose [-p|--init-password string] use string as initial password/file [-l|--length min-max] check password with length min to max [-u|--use-unzip] use unzip to weed out wrong passwords [-m|--method num] use method number "num" (see below) [-2|--modulo r/m] only calculcate 1/m of the password file... the zipfiles to crack methods compiled in (* = default): 0: cpmask 1: zip1 *2: zip2, USE_MULT_TAB
这里我使用-D -u -p三个参数,字典用的kali自带的rockyou.txt:
root@kali:~# fcrackzip -D -u -p /usr/share/wordlists/rockyou.txt ./Downloads/backup PASSWORD FOUND!!!!: pw == thebackup
二、使用john破解
生成hash文件
root@kali:~/Downloads# zip2john backup > h.txt ver 2.0 efh 5455 efh 7875 backup/dump.sql PKZIP Encr: 2b chk, TS_chk, cmplen=269921, decmplen=1868829, crc=920D504C
破解hash文件
root@kali:~/Downloads# john h.txt Using default input encoding: UTF-8 Loaded 1 password hash (PKZIP [32/64]) Will run 4 OpenMP threads Proceeding with single, rules:Wordlist Press 'q' or Ctrl-C to abort, almost any other key for status Warning: Only 5 candidates buffered for the current salt, minimum 8 needed for performance. Warning: Only 1 candidates buffered for the current salt, minimum 8 needed for performance. thebackup (backup/dump.sql) 1g 0:00:00:00 DONE 1/3 (2019-07-02 01:56) 33.33g/s 249000p/s 249000c/s 249000C/s ~sqldump..thedbackup Use the "--show" option to display all of the cracked passwords reliably Session completed
破解时间根据密码的复杂程度来、密码越复杂破解时间越长!
收藏用户