From owner-cvs-ports@FreeBSD.ORG Thu Jul 28 10:55:44 2005 Return-Path: X-Original-To: cvs-ports@FreeBSD.org Delivered-To: cvs-ports@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5A60216A41F; Thu, 28 Jul 2005 10:55:44 +0000 (GMT) (envelope-from stolz@i2.informatik.rwth-aachen.de) Received: from atlas.informatik.rwth-aachen.de (atlas.informatik.RWTH-Aachen.DE [137.226.194.2]) by mx1.FreeBSD.org (Postfix) with ESMTP id BE17243D45; Thu, 28 Jul 2005 10:55:43 +0000 (GMT) (envelope-from stolz@i2.informatik.rwth-aachen.de) Received: from i2.informatik.rwth-aachen.de (menelaos.informatik.RWTH-Aachen.DE [137.226.194.73]) by atlas.informatik.rwth-aachen.de (8.12.10/8.12.10/SuSE Linux 0.7) with ESMTP id j6SAtfXB003734; Thu, 28 Jul 2005 12:55:41 +0200 Received: (from stolz@localhost) by i2.informatik.rwth-aachen.de (8.13.1/8.13.1/Submit) id j6SAtfLw033428; Thu, 28 Jul 2005 12:55:41 +0200 (CEST) (envelope-from stolz) Date: Thu, 28 Jul 2005 12:55:41 +0200 From: Volker Stolz To: Renato Botelho Message-ID: <20050728105541.GB16177@i2.informatik.rwth-aachen.de> References: <200507281032.j6SAWHTp038164@repoman.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200507281032.j6SAWHTp038164@repoman.freebsd.org> X-PGP-Key: finger vs@foldr.org X-PGP-Id: 0x3FD1B6B5 User-Agent: Mutt/1.5.8i Cc: cvs-ports@FreeBSD.org Subject: Re: cvs commit: ports/security Makefile ports/security/pkcrack Makefile distinfo pkg-descr X-BeenThere: cvs-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Jul 2005 10:55:44 -0000 Am 28. Jul 2005 um 12:32 CEST schrieb Renato Botelho: > This package implements an algorithm for breaking the PkZip cipher [...] > - You need to know only a part of the plaintext (at least 13 bytes). Many files > have commonly known headers, like DOS .EXE-files. Knowing a reasonably long > header you can recover the password and decrypt the entire file. Is someone working on a virus-scanner for encrypted zip-files using this approach yet? :) Volker -- http://www-i2.informatik.rwth-aachen.de/stolz/ *** PGP *** S/MIME It's a million to one chance, but it just might work.