0v0@sopuli.xyztoLinux@lemmy.ml•How would I go about gaining access to a locked-down Linux device I own.
25·
10 hours agoThe entries in update.zip
are encrypted using the weak ZipCrypto scheme, which is known to be seriously flawed. If you feel motivated, and can guess at least 12 bytes of plaintext for an entry, it is possible to recover the internal state of the generator, which is enough to decipher the data entirely, as well as other entries which were encrypted with the same password. The bkcrack project implements this attack.
Since some of the entries are zip files themselves, it is within the realm of possibility to guess 12 bytes of plaintext. Parts of the zip local file header are pretty static, and you can use some of the values from the local file header of update.zip
itself. Still, this would require a bit of luck / inspired guesswork.
The inner zip files are just stored, uncompressed:
So 12 bytes from the original content.