Quote from Z
Is this ZIP file a big one file, or it is split into smaller parts like < 2GB. Maybe something with the big file handling went wrong, but if this is the situation - I don't know what to do.
The data inside de zip file is aprox 900 GB of data, but the zip file is aprox 300 MB, so I think that there isn't an error in the file handling.
Quote from Kender
It'll have replaced all occurrences of 0d0a with 0a. Good luck figuring out which 0a needs a 0d in front
To check, see if your file has any 0d0a in it. If there are none then the chance that this happened is big
I found some 0d 0a and other 0d 0x bytes all over the file.
Quote from Kender
You can also take a closer look at the headers inside the zip file. Some info here: ftp://ftp.info-zip.org/pub/infozip/doc/appnote-iz-latest.zip and here http://www.winzip.com/aes_info.htm
Thanks, an imagen would clarify the situation.
Click To view the image of the Zip file structure that I have
In that image we can extract the headers (Appear in order of boxes):
*Local file header signature (4 bytes) 0x04034b50 (PK)
*Version needed to extract (2 bytes) 0x0014
*General purpose bit flag (2 bytes) 0x0001 ('As for any encrypted file, bit 0 of the "general purpose bit flags" field must be set to 1 in each AES-encrypted file's local header and central directory entry.')
*Compression method (2 bytes) 0x0063
*Last modified file time (2 bytes) 0x8ec1
*Last modified file date (2 bytes) 0x3789
*Crc-32 (4 bytes) 0x00000000 ('For files encrypted using the AE-2 method, the standard Zip CRC value is not used, and a 0 must be stored in this field.')
*Compressed size (4 bytes) 0x00000a83 (2691 bytes)
*Uncompressed size (4 bytes) 0x00005400 (21504 bytes)
*File name length (2 bytes) 0x0027 ('xExchange/AMI Price Scatter Example.xls 27h bytes 39 bytes long')
*Extra field length (2 bytes) 0x000b ('The extra data header ID for AES encryption is 0x9901. The fields are all stored in Intel low-byte/high-byte order. The extra data field currently has a length of 11: seven data bytes plus two bytes for the header ID and two bytes for the data size. Therefore, the extra data overhead for each file in the archive is 22 bytes (11 bytes in the central header plus 11 bytes in the local header)').
"xExchange/AMI Price Scatter Example.xls"
And here's come the extra data field of 11 bytes:
*Extra field header ID (2 bytes) 0x9901
*Data size (2 bytes) 0x0007
*Integer number version specific to the vendor zip (2 bytes) 0x0002
*2-character vendor ID (2 bytes) 0x4541 (AE)
*Integer mode value indicating AES encryption strength (1 byte) 0x03 ('256-bit encryption key')
*The actual compression method used to compress the file (2 bytes) 0x0008
And the next part of the archive is the compressed and encrypted data.
Quote from Kender
Since the target file was encrypted, the chances are that the WinZip installation on that W2k3 box is configured to encrypt files by default. If you have left the WinZip settings on that machine alone the chance is good that you can recover the password it used.
The server was formated a few weeks ago, and the data is irrecoverable
And that's all, anyway, I'm not giving up hope.
Thank you very much Z and Kender for the reply. With that analysis I'm sure that the file is encrypted with AES 256.