ZIP, WINZIP AND PKZIP® PASSWORD
RECOVERY
WINZIP® and PKZIP® programs feature fairly robust encryption
but there are four ways to extract data and passwords from these
files.
We use the method that is called a dictionary attack. In this attack,
passwords from a VERY large list of words in numerous languages,
phrases, numbers, names, quotes and other sources of common passwords
are used to attempt to guess the password. Multiple combinations
of capitalization and combinations of words are tested. Because
of the speed of the software programs we use to perform this work,
this can be done relatively quickly. We have compiled dictionaries
from numerous sources into a single large dictionary which can be
used for this type of attack. Typically, people are very similar
and most people still choose a word, name or number that is short
and easy to remember. This method may provide the password.
The second method is called a brute force attack. In this attack,
every possible combination of characters is tested against the password
until a match is found. This can take a very long time and this
method will only be successful on short passwords. Some level of
enhancement and skill can be added to this method by carefully planning
the sequence of guesses and the character sets used. While this
method will eventually be 100% effective, the length of time needed
utilizing existing technology can sometimes exceed the age of the
universe. While this method is, therefore, only practical with short
passwords, we have had success with this method in the past.
The last method only works on some archives. If you have an archive
created by WINZIP® and it contains more than 5 files all encrypted
at the same time and with the same password, there is a special
recovery method that we can use on this type of file to recover
the password.
If you submit your file for dictionary/brute-force testing, you
pay only if we recover your password. We test your file for passwords
prior to payment and request payment only after we have recovered
your password. If we recover the password, the fee is $70.00.
Brute-force testing will take approximately 2 business days.
Our service is guaranteed — if we fail to recover your passwords
you pay nothing. Please contact us by email
if you would like us to recover Word® ’6/95/97/2000/XP
passwords for you or complete our agreement form and send your .DOC
file(s). Payments are made via a secure PayPal site.
|