deliberateblank.livejournal.com |
Mon 2004-03-01 03:11 |
AZPR can do several million password attempts against a zip file per second on oldish hardware. Assuming there's some way of scripting this, throwing every collection of non-whitespace characters in the message at the zipfile ought not to be too draining. You can even manage various alterations such as stripping characters of the beginning and end (to catch quoted passwords and passwords followed by punctuation). If the passwords are short (4-5 characters) then they can be brute forced in seconds.
Alternatively, why bother. There's probably enough information in the message body/headers to decide it's viral. Possibly just the fact that it's a password protected zip - would you ever expect to receive one of these normally? |
|