Date: Thu, 28 Jul 2005 12:55:41 +0200 From: Volker Stolz <vs@FreeBSD.org> To: Renato Botelho <garga@FreeBSD.org> Cc: cvs-ports@FreeBSD.org Subject: Re: cvs commit: ports/security Makefile ports/security/pkcrack Makefile distinfo pkg-descr Message-ID: <20050728105541.GB16177@i2.informatik.rwth-aachen.de> In-Reply-To: <200507281032.j6SAWHTp038164@repoman.freebsd.org> References: <200507281032.j6SAWHTp038164@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Am 28. Jul 2005 um 12:32 CEST schrieb Renato Botelho: > This package implements an algorithm for breaking the PkZip cipher [...] > - You need to know only a part of the plaintext (at least 13 bytes). Many files > have commonly known headers, like DOS .EXE-files. Knowing a reasonably long > header you can recover the password and decrypt the entire file. Is someone working on a virus-scanner for encrypted zip-files using this approach yet? :) Volker -- http://www-i2.informatik.rwth-aachen.de/stolz/ *** PGP *** S/MIME It's a million to one chance, but it just might work.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050728105541.GB16177>