What is FZC ?
FZC is a program that cracks or unlock or remove password on zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it). You can get it anywhere – just use a search engine such as 4shared.com.
FZC uses multiple methods of cracking:
- Bruteforce (guessing passwords systematically until the program gets it)
- Wordlist attacks (otherwise known as Dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a “wordlist”, which is a text file that contains possible passwords. You can get lots of wordlists at http://wordlist.sourceforge.net).
FZC can be used in order to achieve two different goals:
- You can either use it to recover a lost zip password which you used to remember but somehow forgot
- for cracking zip passwords which you’re not supposed to have.
So like every tool, this one also can be used for good and for evil.
The first thing I want to say is that reading this tutorial is the easy way to learn how to use FZC program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all.
You are also going to see the phrase “check name.txt” often in this text. These files should be in FZC’s directory. They contain more information about FZC.
FZC is a good password recovery tool, because it’s very fast and also support resuming so you don’t have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything – a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn’t really matter, because in order tobruteforce a password with 32 chars you’ll need to be at least immortal. To see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don’t require you to have anything, wordlist attacks require you to have wordlists, which you can get from here.
There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait…, wait… and… wait and have good thoughts like “In wordlist mode I’m gonna get the password in minutes” or something like this… you start doing all this and remember “Hey this guy started with all this bullshit and didn’t say how I can start a wordlist attack !” So please wait just a little more, read this tutorial ’till the end and you can do all this “bullshit”.
We need to keep in mind that are some people might choose some really weird passwords (for example: ‘e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won’t help you anymore. Instead, you’ll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won’t get anywhere. What you need to do in such a situation is to put aside your sweet XXX mb’s list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you’re afraid that you won’t be able to use your computer’s power to the fullest because the zip cracker doesn’t support this kind of technology, it’s your lucky day ! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.
Now that we’ve gone through all the theoretical stuff, let’s get to the actual commands.
Bruteforce
The command line you’ll need to use for using brute force is:
fzc -mb -nzFile.zip -lChr Length -cType of chars
Now if you read the bforce.txt that comes with fzc you’ll find the description of how works Chr Length and the Type of chars, but hey, I’m gonna explain this too. Why not, right ? (but remember look at the bforce.txt too)
For Chr Length you can use 4 kind of switches:
- You can use range 4-6 : It would brute force from 4 Chr passwors to 6 chr passwords
- You can use just one length 5 : It would just brute force using passwords with 5 chars
- You can use also the all number 0 : It would start brute forcing from passwords with length 0 to 32, even if you are crazy i don’t think that you would do this. If you are thinking in doing this get a live.
- You can use the + sign with a number 3+ : In this case it would brute force from passwords with length 3 to passwords with 32 chars of length, almost like the last option.
For the Type of chars we have 5 switches they are:
- a for using lowercase letters
- A for using uppercase letters
- ! for using simbols (check the Bforce.txt if you want to see what simbols)
- s for using space
- 1 for using numbers
Example: If you want to find a password with lowercase and numbers by brute force you would just do something like:
fzc -mb -nzTest.zip -l4-7 -ca1
This would try all combinations from passwords with 4 chars of length till 7 chars, but just using numbers and lowercase.
HINT - You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn’t work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.
Wordlist
Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I’m not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I’m going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attack you’ll do something like.
fzc -mwMode number -nzFile.zip -nwWordlist
Where Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn’t in the same directory of FZC you’ll need to give the all path.
You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, theswitche works like in bruteforce mode.
So if you something like
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+
FZC would just start reading at line 50 and would just read with length >= to 9.
Example:
If you want to crack a file called myfile.zip using the “theargonlistserver1.txt” wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50
Resuming
Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:
fzc -mr and the bruteforce attack will start from the place where it stopped when you pressed the ESC key. But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type:
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100
Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.
Well, it looks like I covered most of what you need to know. I certainly hope it helped you, don’t forget to read the files that come with the program.
13 comments:
SERIOUS MINDED PEOPLE SHOULD CONTACTNeed a hacker?was in a bit of some really embarrassing cyber issues which led me to meeting some scammers as well but my will to solve my issue eventually paid off when i met Cryto Cyber Hacker,his work rate,professionalism and discretion is top-class. Hit him up at cryptocyberhacker@gmail.com. he's kinda picky though so make mention of the reference. Tell him i referred you. You're welcome
Hello im Tara BY NAME I met a Hacker called Mr NEO Cash told him to Hacker my husband Facebook acct OR ANY HIGH GRADE UNLOCKING,PHONE TRACKING,DATABASES HACK,CODE ENCRYPTION,UNTRACEABLE IP,WEBSITES HACK,BANK TRANSFERS,CREDITS CARD HACK,WESTERN UNION ,CLEARING OF CRIMINAL RECORDS,FACEBOOK ACCT ,EMAIL ADDRESS HACKING,COMPANY RECORDS HACKING. WE CAN EVEN PUT YOUR NAME IN THE KINGDOM OF HEAVEN. for me he did it so Thanks to be.......If you want to get intouch with him here ..CRACKCYBERHACKER@GMAIl .COM
Need The To Hire A Hacker❓ Then contact PYTHONAX✅
The really amazing deal about contacting PYTHONAX is that the Hack done by us can’t get traced to you, as every Hacking job we do is strongly protected by our Firewall. It’s like saying if anyone tries to trace the Hack, it will lead them to us and we block whatever actions they are doing.
We have been Invisible to Authorities for almost a decade now and if you google PYTHONAX, not really about us comes out, you can only see comments made by us or about us.
Another Amazing thing to you benefit from Hiring our Hackers is that you get a Legit and the best Hacking service, As we provide you with Professional Hackers who have their Hacking Areas of specialization.
We perform every Hack there is, using special Hacking tools we get from the dark web.
Some list of Hacking Services we provide are-:
▪️Phone Hacking & Cloning ✅
▪️Computer Hacking ✅
▪️Emails & Social Media Account Hacking✅
▪️Recovering Deleted Files✅
▪️Tracking & Finding People ✅
▪️Hunting Down Scammers✅
▪️Hack detecting ✅
▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅
OTHER SPECIAL HACKING SERVICES
▪️Binary Option Recovery ✅
▪️Scam Money Recovery✅
▪️Bitcoin Multiplication✅
▪️Change Of Grades In Universities/Colleges ✅
▪️Phone Calls Monitoring✅
▪️keyLogging Installation✅
▪️Remote Access Trojan (RAT) installation ✅
▪️Cyber Security Upgrade✅
▪️And lots more...........
Whatever Hacking service you require, just give us an Email using the Emails Address provided below.
pythonaxhacks@gmail.com
pythonaxservices@gmail.com
PYTHONAX.
2020 © All Right Reserved.
searching for Professional, legit and honest hacker. i can hack anything. affordable price. fast and reliable. contact me at:-(wizardcyprushacker@gmail.com)
CONTACT:(wizardcyprushacker@gmail.com) We are best when it comes to hacking our services include: 1. School Grades Change 2. Drivers License 3. Hack email 4.
Database hack 5. Facebook, Whatsapp 6. Hack Call Logs, 7. Retrieve messages, deleted data and recovery of messages
on cell phone 8. Crediting , Money Transfer and other various activies 9. Sales of Dumps, Dead drops and fresh CC We
also sell high grades techs and hacking chips and gadgets if you are interested in Spying on anyone. We sell software,
apps for hacking service. Your security is 100% guarantee and we have testimonies all around the world.We get your job done without any disappointment.
Interested parties can reach us at (wizardcyprushacker@gmail.com) whatsapp +1 (424) 209-7204
Beware of scammers i have been scammed 3 times because i was trying to know if my husband was cheating until i met this hacker named; (wizardcyprushacker@gmail.com) who helped me hack into my spouse phone for real this great hacker hacked into my spouse whats-app messages,Facebook messages.text messages,call logs,deleted text messages,bitcoin recovery and bank transfer hack,clear criminals records,and many more i was impressed with his job and he brought me results under 24 hours believe me he is real and his services are cheap and affordable. whatsapp +1 (424) 209-7204
Be proud to make up to $7,000 weekly with your bitcoin wallet by yourself without sending your money to anyone. I will be teaching the first 20 people to comment INFO. Interested persons only please. Contact me on my Email:(fabuloushacker01@gmail.com) whatsapp +1 (424) 209-7204 for more details It's %100 guaranteed
Excellent and professional investigative services. I hired Mr JOSH for a very private and difficult matter of hacking my husband's phone and he far exceeded my expectations. He helped me get some info such as whatsapp, facebook, text messages, call logs and even phone conversations that I needed for proof of his secretive affair. The first time we spoke, we had a very long phone consultation in which he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. He is a fantastic investigator and a great person; to all loyal partners out there if you have a dishonest partner don't hesitate to send him a mail Contact: CYBERAPPHACK@GMAIL.COM.
WHATSAPP: +1(562)265-8063.
Credit Fixing, cyber-crime investigation, Hack Bank Accounts, Identification of Cheating Partner or employee,GET HOT STOCK TIPS Then contact contact Email:- stocktipsandethicalhacking2020@gmail.com Hangout :- stocktipsandethicalhacking2020@gmail.com Business Whatsapp :- 1 (925) 291-0054) Text Message/Call: +1 424) 274 2967 or click on this link to chat on whatsapp https://wa.me/message/REE2BBXU4CEYF1
he won't under any circumstances work for free
Hello friends, I’m from London and I’m using this medium to testify to the genuine work of an Hack Pro and PIA.When it comes to hacking although, I never believed it could be possible for me to access someone device without touching it but after contacting the hack pro (Larrywizardhacking57@gmail.com), now I know better.They hack all social media platforms, smartphones, bank Accounts, help recover stolen crypto and even more.
Quite amazing.You can also contact him via WhatsApp
Text:+1(2135297780).
My name's are Elizabeth Harrison from Chicago, IL. I work as a nurse by profession, was earning a little bit okay $3400 monthly, with my two kids I decided that I need to invest, the taught of my investment came after I meant a guy online who makes me feel comfortable and always talk me into self-employed business, I decide to always seek for his advice and he gave me a broker site where I can invest and have profit within a short period of time, I do really trust him but after I invested into the crypto site I discover he was behind everything and I have lost all my savings to him without knowing how he gets into me and lure me with his sweet fuckin words, he ruined my life and I couldn't be myself anymore. So i decide to seek for help, omg... any attempt i made i get more scammed couldn't figure out who was real and who wasn't and at the end of it all i came up with a decision that nothing on the internet is real again. after 2 months i gave up on recovery the money i sent to broker site by bitcoin payment which is up to $65,992 i was on Spotify trying to get some lonely songs for myself when i came across wizardwilsonsoftware (@) Yahoo.com (.) , it sounded real but i was scared to contact him cause it seems i'm not just lucky with making money on investment maybe i had to work through out my whole lifetime so i ignored but i was in a worker meeting when a discussion lead to bitcoin scam and i heard one of my co-worker saying wizard wilson got her funds back and i ask her how she reached him and she gave me this WhatsApp +1(321) 621_1089 i reached out to Wizard Wilson immediately i got home and we talked for long and i decide to put him to test, to end the whole story, i got more than what i loss on my new blockchain wallet, i was scared at first until he explained to me, a big thanks to the only real recovery hacker online and that's wizard wilson who i have experienced his magic wizard actually.
i have been through hard times trying find out if my spouse was cheating on me have been scammed 2 good times until i was referred to a great hacker called shadownethacker44@gmail.com who i contacted for help into my spouse phone and he gave me 24 hours i was so so happy that under 24 hours this hacker broke into my spouse phone and i was able to access his phone without touching his phone i got to read his text messages, call logs, whats-app, tinder, email, Facebook, deleted text messages and many more he uses to communicate with people and i saw a lot that show my spouse is a cheater thanks to shadownethacker44@gmail.com or whatsapp him on +1 (929) 744-2921 for making this hack possible God bless
I would like to give my gratitude to Wizard James Services because this site is the only one where there is nothing superfluous going on, they were completely honest and transparent all the way through. They said they could crack my wallet, it took them 4 hours and they took their 20% and left me the rest, Job well done. His contact: wizardjamesrecovery@usa.com or WhatsApp: +1 (863) 254-2842
Post a Comment