Solved

I'm mad! I forgot my .zip password, HELP!!

Posted on 2004-03-26
11
922 Views
Last Modified: 2007-12-19
I have a zip file that I so brightly added a password to months ago, and being the smart guy, I am. I didnt write it down and forgot the password and NOW when I Really need it contents NO LUCK!!


I have tried picozip to brute force hack it. = 0

I need something better, faster.  Is there any magic tool that will rip it to shreds and give me my files!!!??lol

Please Help!

Thank you,
Caiapfas
0
Comment
Question by:Caiapfas
  • 3
  • 2
  • 2
  • +3
11 Comments
 
LVL 67

Expert Comment

by:sirbounty
Comment Utility
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
0
 
LVL 2

Author Comment

by:Caiapfas
Comment Utility
but can some one tell me the best, or give me a testimony of one really comming thru for you...
And if possible can you tell me free ones...(cracking tools)


Caiapfas
0
 
LVL 67

Assisted Solution

by:sirbounty
sirbounty earned 100 total points
Comment Utility
Dude - the first post in my list was rated 5 stars!
We've used it in my company, although I haven't personally...
0
 
LVL 49

Assisted Solution

by:sunray_2003
sunray_2003 earned 100 total points
Comment Utility
Caiapfas,
> but can some one tell me the best,

this is a very general question because there are lot of tools available online and each would have got their personal experience. Try the tools listed by SB or check the link i had given
0
Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
I am partial to Elcomsoft products as they have never dissapointed me: http://www.elcomsoft.com/archpr.html Advanced archive password recovery. I love it, it works well, and is well worth the money if you have users that do this often... as we do...
-rich
0
 
LVL 4

Accepted Solution

by:
kruptos earned 300 total points
Comment Utility
Try www.packetstormsecurity.org they have a pretty comprehensive database full of these tools. They even have explainations on there capabilities on most.

The ones that were mentioned above are all great tools, and yes...sometimes brute forcing takes time, if it didnt take anytime it would be the equivlent of asking yourseklf, why set a password...lol

Recommendation: If you are going to password protect your files, store a master password list in a safe place, such as a safe or safe deposit box..(not on your system)...that way you woulnt have to waste countles hours in the futre trying to recover the files that you shoult nativly have access too. I am assuming you own these files that you are trying to crack...if not thats a whole oterh dicussion :-)

Let me know if that helps!

Thanks!
0
 
LVL 2

Author Comment

by:Caiapfas
Comment Utility
for furture refrence http://www.elcomsoft.com/azpr.html (Advanced Zip file password recovery) took 5 seconds to find it. I was floored, amazing!!

I ran Picozip for 3 days on 2 diffrent machices!!!!!!!! and never found it
0
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
I told ya so ;)
I've made recovery part of my consultiong, and these paid for them selves 10x over.
-rich
0
 
LVL 2

Author Comment

by:Caiapfas
Comment Utility
richrumble,

I'm very sorry, I overlooked your correct answer... please go here for one simple question and 500 points..please post
http://www.experts-exchange.com/Security/Q_20982253.html
0
 

Expert Comment

by:mgbyrne2004
Comment Utility
*** advertising removed by Netminder, Site Admin ***
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now