Uy_Charles_LAB3 - Encrypting and Decrypting Data Using a Hacker Tool
Uy_Charles_LAB3 - Encrypting and Decrypting Data Using a Hacker Tool
- TW31
Lab - Encrypting and Decrypting Data using a Hacker Tool
Objectives
Part 1: Create and Encrypt Files
Part 2: Recover Encrypted Zip File Passwords
Background / Scenario
What if you work for a large corporation that had a corporate policy regarding removable media? Specifically,
it states that only encrypted zipped documents can be copied to portable USB flash drives.
In this scenario, the Chief Financial Officer (CFO) is out-of-town on business and has contacted you in a
panic with an emergency request for help. While out-of-town on business, he attempted to unzip important
documents from an encrypted zip file on a USB drive. However, the password provided to open the zip file is
invalid. The CFO contacted you to see if there was anything you could to do.
Note: The provided scenario is simple and only serves as an example.
There may some tools available to recover lost passwords. This is especially true in situations such as this
where the cybersecurity analyst could acquire pertinent information from the CFO, such as the length of the
password, and an idea of what it could be. Knowing pertinent information dramatically helps when attempting
to recover passwords.
Examples of password recovery utilities and programs include hashcat, John the Ripper, Lophtcrack, and
others. In our scenario, we will use fcrackzip which is a simple Linux utility to recover the passwords of
encrypted zip files.
Consider that these same tools can be used by cybercriminals to discover unknown passwords. Although
they would not have access to some pertinent information, with time, it is possible to discover passwords to
open encrypted zip files. The amount of time required depends on the password strength and the password
length. Longer and more complex passwords (mix of different types of characters) are more secure.
In this lab, you will:
• Create and encrypt sample text files.
• Decrypt the encrypted zip file.
Note: This lab should be used for instructional purposes only. The methods presented here should NOT be
used to secure truly sensitive data.
Required Resources
• CyberOps Workstation Virtual Machine
• Internet access
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
b. Open a terminal window. Verify that you are in the analyst home directory. Otherwise, enter cd ~ at the
terminal prompt.
c. Create a new folder called Zip-Files using the mkdir Zip-Files command.
d. Move into that directory using the cd Zip-Files command.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
f. Verify that the files have been created, using the ls command.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
d. Verify that all zipped files have been created using the ls -l f* command.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
In our examples, we will be using the –v, -u, and -l command options. The -l option will be listed last
because it specifies the possible password length. Feel free to experiment with other options.
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 9 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
Note: The password length could have been set to less than 1 – 4 characters.
How long does it take to discover the password?
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 10 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 11 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 12 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 13 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 14 of 15 www.netacad.com
Lab – Encrypting and Decrypting Data Using a Hacker Tool
© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 15 of 15 www.netacad.com