Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 28 Jul 2005 12:55:41 +0200
From:      Volker Stolz <vs@FreeBSD.org>
To:        Renato Botelho <garga@FreeBSD.org>
Cc:        cvs-ports@FreeBSD.org
Subject:   Re: cvs commit: ports/security Makefile ports/security/pkcrack Makefile distinfo pkg-descr
Message-ID:  <20050728105541.GB16177@i2.informatik.rwth-aachen.de>
In-Reply-To: <200507281032.j6SAWHTp038164@repoman.freebsd.org>
References:  <200507281032.j6SAWHTp038164@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Am 28. Jul 2005 um 12:32 CEST schrieb Renato Botelho:
>   This package implements an algorithm for breaking the PkZip cipher [...]
>    - You need to know only a part of the plaintext (at least 13 bytes). Many files
>      have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
>      header you can recover the password and decrypt the entire file.

Is someone working on a virus-scanner for encrypted zip-files using this approach yet? :)

Volker
-- 
http://www-i2.informatik.rwth-aachen.de/stolz/ *** PGP *** S/MIME
It's a million to one chance, but it just might work.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050728105541.GB16177>