I use winrar.

14 points

This is a great time to learn about hashcat.

permalink
report
reply
13 points

Isn’t that the tool that let’s you brute force weak encrypted containers? I remember saving my sister that got a pin secured container and the pin was coming over mail/on a different channel (she needed it as fast as possible)…

Well it was a 4 digit pin and my very old notebook took a few hours. Even less if my sister would have told me that it was a 4 digit nummeric pin and not alphanumeric.

So yea. Hashcat will be your friend. Afaik can also take guesses.

permalink
report
parent
reply
4 points

How fast it is depends entirely on the application.

But yes, it can do all sorts of fancy things like rule expansions, word combinations and custom character brute force.

permalink
report
parent
reply
0 points
Deleted by creator
permalink
report
parent
reply
6 points

It sits in that conceptual corner.

Hashcat is the standard password recovery tool. It supports a whole bunch of applications. It’s fast and optimized. It’s by definition the right tool for the job.

Kali is a Linux distribution that incorporates a bunch of security related tools, including hashcat. But you can just download the hashcat program and run it on windows or Mac.

permalink
report
parent
reply
17 points
*

Is there a way to call the unrar command via command line and pass the password as a parameter? There should be.

If there is not with winrar, try the 7zip commandlet for powershell, that should definitely be able to do what you want.

Write a quick skript that reads your passwords from a text file into a variable, use a foreach-object loop to iterate over the variable and each time call the unrar command and use the current password.

Not sure if this is elegant, but that’s the first thing that comes to my mind.

7zip module documentation

permalink
report
reply
3 points
*

Ask chat gpt! It will not only tell you exactly how, and build the script for you, you will also be able to add ask custom questions when things go wrong, or get other methods.

Chatgpt is a google search on steroids.

Edit: yall can downvote gpt all you want, it took me 3 minutes to do it locally and it provided a safe and valid script.

Source: Director of Engineering at an almost FAANG sized company

permalink
report
reply
4 points

What search term do you use? I’ve just tried and it said it can’t help with that.

permalink
report
parent
reply
13 points
*

Me: I need to write a powershell script on windows to open a password protected zip file for which I have the password

Gpt:

Sure! Here’s how you can create and use a PowerShell script to unzip a password-protected zip file on Windows:

First, make sure you have the required module installed. You can use Expand-Archive for normal zips, but for password-protected zips, we will leverage the 7-Zip utility. You can download it from here.

After installing 7-Zip, you can use its command line interface, 7z.exe, usually located in C:\Program Files\7-Zip.

Create a PowerShell script named UnzipProtected.ps1 with the following content:

    [Parameter(Mandatory=$true)]
    [string]$zipFilePath,

    [Parameter(Mandatory=$true)]
    [string]$destinationPath,

    [Parameter(Mandatory=$true)]
    [string]$password
)

$sevenZipPath = "C:\Program Files\7-Zip\7z.exe"

if (-not (Test-Path $sevenZipPath)) {
    Write-Error "7-Zip not found at $sevenZipPath. Please install it or adjust the path."
    exit 1
}

& $sevenZipPath x -p$password -o$destinationPath $zipFilePath

if ($? -eq $true) {
    Write-Host "File unzipped successfully!"
} else {
    Write-Error "Failed to unzip the file."
}```


> Now, you can use the PowerShell script to unzip the password-protected file:


```.\UnzipProtected.ps1 -zipFilePath "path_to_your_zip_file.zip" -destinationPath "path_to_extract_folder" -password "yourpassword"

Replace the placeholders with the appropriate paths and password.

Note: Make sure you execute the PowerShell script with appropriate permissions (Run as Administrator if required). Also, ensure that your execution policy allows you to run scripts (Set-ExecutionPolicy RemoteSigned or Set-ExecutionPolicy Unrestricted but be aware of the security implications). Always handle passwords securely.

Me: Can you have it loop through a handful of my passwords

Gpt:

Certainly. We can adjust the script to loop through a list of passwords until the correct one is found or the list is exhausted.

Modify the UnzipProtected.ps1 script as follows:

    [Parameter(Mandatory=$true)]
    [string]$zipFilePath,

    [Parameter(Mandatory=$true)]
    [string]$destinationPath,

    [Parameter(Mandatory=$true)]
    [string[]]$passwords
)

$sevenZipPath = "C:\Program Files\7-Zip\7z.exe"

if (-not (Test-Path $sevenZipPath)) {
    Write-Error "7-Zip not found at $sevenZipPath. Please install it or adjust the path."
    exit 1
}

$success = $false

foreach ($password in $passwords) {
    & $sevenZipPath x -p$password -o$destinationPath $zipFilePath

    if ($? -eq $true) {
        Write-Host "File unzipped successfully with password: $password"
        $success = $true
        break
    }
}

if (-not $success) {
    Write-Error "Failed to unzip the file with provided passwords."
}

You can now use the script to try multiple passwords:

.\UnzipProtected.ps1 -zipFilePath “path_to_your_zip_file.zip” -destinationPath “path_to_extract_folder” -passwords @(“password1”, “password2”, “password3”)

Replace the placeholders with the appropriate paths and the list of passwords you want to try.

Note: Be very careful with this kind of script, especially if you’re using it with real passwords. It’s essential to handle passwords securely, and not to keep them in clear text or hardcoded in scripts. Use this approach only in a controlled and secure environment.

Obviously this is an example, but you can keep talking to it to refine how you want the search to happen. If there’s an error, tell gpt what happened, or which step you aren’t able to do and it will walk you through that as well!

Was hard to copy paste over on my phone so format is a bit messed up, but you get the idea

permalink
report
parent
reply
4 points

going to try this! thank you.

permalink
report
parent
reply
-1 points

While it might be close to good enough for casual scripts, it is much better to use existing tools for performance critical applications, such as brute forcing passwords.

permalink
report
parent
reply
6 points

Lmao. Is this not a “casual script”? The dude wants to try a handful of passwords, not brute force a leaked db.

permalink
report
parent
reply
0 points

I believe not. The question states “keywords” so it seems they want to try combinations of words they commonly used. And it makes a huge difference if the script can try one password per second or dozens/hundreds/more.

permalink
report
parent
reply
-1 points

First lemmy troll

permalink
report
parent
reply
4 points

Completely baffling why you’re being downvoted. This is a perfect application of chatgpt.

permalink
report
parent
reply
16 points
*
Deleted by creator
permalink
report
reply
4 points

It does! Almost everyone is using hashcat, but JTR is still a thing.

permalink
report
parent
reply
9 points

john the ripper?

permalink
report
parent
reply

Asklemmy

!asklemmy@lemmy.ml

Create post

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it’s welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

Icon by @Double_A@discuss.tchncs.de

Community stats

  • 10K

    Monthly active users

  • 5.9K

    Posts

  • 319K

    Comments