How to decrypt zip file password for mmi update?
-
- Новичок
- Сообщения: 4
- Зарегистрирован: Вт авг 27, 2019 3:31 pm
Hello, I was wondering how to do it on my own.
Password found in xml - is base64 encoded 16 bits hex.
That longer "zip password" is base64 encoded 32 bit hex. That could be AES256 encryption key, but even if I do use decrypt with IV all 00, I get some rubish in output.
Anyone can give some guidance?
Password found in xml - is base64 encoded 16 bits hex.
That longer "zip password" is base64 encoded 32 bit hex. That could be AES256 encryption key, but even if I do use decrypt with IV all 00, I get some rubish in output.
Anyone can give some guidance?
@Lapkitinis i got a not working copy of the SD Updater Folder (can't find the Installer anymore, there it started once but without a server i deinstalled and deleted it).
I opened a DLL File with disassembler. It was programmed in .NET.
Because i'm not familiar with programming, there I found something. (2-3 long strings which could be the key) but don't understand how it is used. Encryption and Decryption is there described and works over rijndaelmanagedv2 so possible some AES Encryption -> maybe AES256 with Base64 Encoding
Maybe a programming crack understands something and can build a quick n dirty tool.
A zip2 and pkzip2 hash is extracted with zip2john. Other tool I use hashcat (can use gpu) don't accept the zip2 hash and pkzip2 is still in development and not in the official release still trying to build here something. but till now i don't had success with it, because other ppl cracking those passes before and I stop it.
I opened a DLL File with disassembler. It was programmed in .NET.
Because i'm not familiar with programming, there I found something. (2-3 long strings which could be the key) but don't understand how it is used. Encryption and Decryption is there described and works over rijndaelmanagedv2 so possible some AES Encryption -> maybe AES256 with Base64 Encoding
Maybe a programming crack understands something and can build a quick n dirty tool.
Other possibility is try to Bruteforce the pass. I only got it working with JtR but for winzip it can only bruteforce over cpu which is very slow.First it starts something called - get_key and get_IV
when pressing there, it sends me somewhere, where this .ctor string is which you can find also down there after base64 string @MemoryStream:
then back to the normal script -> it sets the key, the IV and a Mode -> System.Security.Cryptography.CipherMode
then it starts something like this
call unsigned int8[] [mscorlib]System.Convert::FromBase64String(string)
newobj instance void [mscorlib]System.IO.MemoryStream::.ctor(unsigned int8[])
then it starts some action which can end in a red line to a script with a false command, or a green line with something other.
.ctor string sets following two things:
ldtoken valuetype __StaticArrayInitTypeSize=9 <PrivateImplementationDetails>::E8C040FA7AE8F580FCF9EDAB3EC4CDC003EF9775 <-- possible secret key?
call void [mscorlib]System.Runtime.CompilerServices.RuntimeHelpers::InitializeArray(class [mscorlib]System.Array, valuetype [mscorlib]System.RuntimeFieldHandle)
stloc.0
ldstr aFroahasshasvgh // "FRoaHAsSHAsVGhkLEhke" <-- possible the secret or other salting key?
A zip2 and pkzip2 hash is extracted with zip2john. Other tool I use hashcat (can use gpu) don't accept the zip2 hash and pkzip2 is still in development and not in the official release still trying to build here something. but till now i don't had success with it, because other ppl cracking those passes before and I stop it.
-
- Новичок
- Сообщения: 4
- Зарегистрирован: Вт авг 27, 2019 3:31 pm
Thanks so muchcongo писал(а):https://mega.nz/#!s0gUSSYS!KWdJJuoMBmY- ... fjMHRcLamY
-
- Пользователь
- Сообщения: 34
- Зарегистрирован: Чт авг 15, 2019 12:18 pm
-
- Новичок
- Сообщения: 18
- Зарегистрирован: Чт апр 13, 2017 3:57 pm
- Откуда: china
-
- Пользователь
- Сообщения: 34
- Зарегистрирован: Чт авг 15, 2019 12:18 pm
-
- Пользователь
- Сообщения: 34
- Зарегистрирован: Чт авг 15, 2019 12:18 pm
[LEFT]Has anyone the Zip password for following files:
<pack:Name>4M0906961DQ</pack:Name>
<pack:Zugversion>MHI2_ER_AU57x_K2589</pack:Zugversion><pack:Password>7BjzYKGQ2bwVjpSJTnPgCw==</pack:Password>
and<pack:Id>4M0906961</pack:Id><pack:Zugversion>P0040</pack:Zugversion>
<pack:Password>37FUyv7jHYP+N9XZOggksVC750rKEMypY9vJVBirj/A=</pack:Password>
Thank you![SUB][/SUB][SUB][/SUB]
[/LEFT]
<pack:Name>4M0906961DQ</pack:Name>
<pack:Zugversion>MHI2_ER_AU57x_K2589</pack:Zugversion><pack:Password>7BjzYKGQ2bwVjpSJTnPgCw==</pack:Password>
and<pack:Id>4M0906961</pack:Id><pack:Zugversion>P0040</pack:Zugversion>
<pack:Password>37FUyv7jHYP+N9XZOggksVC750rKEMypY9vJVBirj/A=</pack:Password>
Thank you![SUB][/SUB][SUB][/SUB]
[/LEFT]