Lost my zip file password

Posted on 2005-04-12
Last Modified: 2010-04-11
What can I do to recover my zip file password? is there any way to remove the password from the file?
Question by:wcoka
    LVL 38

    Accepted Solution

    There are two methods for recovery, one is called a "known plain-text" recovery, and the other is really just brute-force.
    Here is a little on Known Plain-Text
    And here are utilites that can do both BF and KPT
    LVL 12

    Expert Comment

    Try this, there is a free download, but you can use it against a password protected ZIP and find the password using the demo:

    LVL 5

    Expert Comment

    and type in "cracking".

    Assisted Solution

    Zip password can be recovered by these to common method brute-force and dictionary.
    To recover the password from the zip file download PicoZip Recovery Tool program from which is free.First try using dictionary which is faster than brute-force if you still did not get the password try brute-force.

    Author Comment

    my problem is that the paswword is about 12 characters
    LVL 38

    Expert Comment

    by:Rich Rumble
    Known-Plain Text attacks are faster than brute-force, Elcomsoft has a good zip recovery program to do both brute force or known plain-text recovery. With a known-plain-text you have to have a file or document that is identical to one in the zip file, no changes in the files data. Otherwise your stuck doing brute-force. You can "speed up" the brute force by specifing a range like 10-12 characters. That will take a long time... which is good for security purposes, but bad for recovery purposes.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    How to sign a powershell script so you can prevent tampering, and only allow users to run authorised Powershell scripts
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now