forensicsProeasy
Skeleton
tjctf
Task: zip2john hash containing a ZipCrypto-encrypted stored PNG, no original ZIP or password. Solution: extract the encrypted blob from the hash, use bkcrack known-plaintext attack with PNG header/footer bytes to recover internal ZipCrypto keys, then decrypt the image.
$ ls tags/ techniques/
zipcrypto_known_plaintext_attackzip2john_hash_parsingpng_header_known_plaintextbkcrack_key_recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]ZipLock— hackerlab
- [stego][Pro]Unsettled Huffman— volgactf
- [misc][Pro]Игра (Game)— hackerlab
- [forensics][Pro]SQLite— hackerlab
- [crypto][free]stained-glass— tjctf