Topic content: The owner of the file likes to use his birthday as a password, and he is born in the 90s.
1. Known conditions
In this problem, we have the following known conditions:
-
The owner of the file likes to use birthdays as passwords - this condition tells us that the password may be an eight-digit pure numeric password, because most people's birthdays can be represented by eight digits in the Gregorian calendar (for example, 19901231 means December 1990 31).
-
The owner of the file is post-90s - this condition limits the range of the password between 19900000 and 19999999. Compared with the full digital password, this greatly narrows the search scope.
-
Password protected files are ZIP archives - this means that we can use some specific ZIP password cracking tools to try to crack the password.
2. Problem-solving ideas
Now that we know that the password may be an eight-digit number composed of birthdays, and there are possible ranges of numbers, the idea of solving the problem is relatively clear: we can try to use some tools or scripts to use all numbers from 19900000 to 19999999 as possible The password to try to extract the ZIP archive.
3. Practical operation
For password cracking of ZIP files, there are many tools that can be used, such as ARCHPR (Advanced Archive Password Recovery) is one of them. ARCHPR is a powerful compressed file password recovery software that supports compressed file password recovery in various formats, including ZIP, RAR, ARJ, ACE, etc.
Using this tool, we can set a specified range of numbers and perform brute force cracking. In general, for numbers in this range, the cracking speed is very fast.
It only takes tens of milliseconds to crack successfully! ! !
But in fact, at the beginning, I also thought about whether this password would be a
6位
number password, for example900101
—991231
, and then tried to crack it, but there was no result, so I chose8位
this
4. Summary and thoughts
Through this challenge, we learned how to effectively follow the prompts 缩小密码破解的范围
.
At the same time, we also learned how to use it 特定的工具进行密码破解
. Although this challenge is relatively simple, the way of thinking and technical methods in it can also be very helpful for other more complex challenges.