(Reply) [entries|reading|network|archive]
simont

[ userinfo | dreamwidth userinfo ]
[ archive | journal archive ]

[identity profile] deliberateblank.livejournal.com Mon 2004-03-01 03:11
AZPR can do several million password attempts against a zip file per second on oldish hardware. Assuming there's some way of scripting this, throwing every collection of non-whitespace characters in the message at the zipfile ought not to be too draining. You can even manage various alterations such as stripping characters of the beginning and end (to catch quoted passwords and passwords followed by punctuation). If the passwords are short (4-5 characters) then they can be brute forced in seconds.

Alternatively, why bother. There's probably enough information in the message body/headers to decide it's viral. Possibly just the fact that it's a password protected zip - would you ever expect to receive one of these normally?
Link Read Comments
Reply:
This account has disabled anonymous posting.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting