Encrypting and Decrypting Data Using a Hacker Tool
Encrypting and Decrypting Data Using a Hacker Tool
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 5 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
In our examples, we will be using the –v, -u, and -l command options. The -l option will be listed last
because it specifies the possible password length. Feel free to experiment with other options.
Note: The password length could have been set to less than 1 – 4 characters.
How long does it take to discover the password?
____________________________________________________________________________________
Lab – Encrypting and Decrypting Data Using a Hacker Tool
b. Now attempt to recover the password of the file-2.zip file. Recall, that a two-character password was
used to encrypt the file. Therefore, use the following fcrackzip command:
[analyst@secOps Zip-Files]$ fcrackzip –vul 1-4 file-2.zip
e. How long does it take to crack a password of five characters? Repeat the procedure and recover the
password of the file-5.zip file. The password length is five characters, so we need to set the -l command
option to 1-5. Again, time to see how long it takes to discover the password using the following fcrackzip
command:
[analyst@secOps Zip-Files]$ fcrackzip –vul 1-5 file-5.zip