I have a file that's nearly 200Mb. It was reportedly packed/encrypted with Kruptos 2. But it has a .~enc
extension. The header of the file is pure gibberish. Running file
says it's data
running mimetype says it's an application/octet-stream
. The only thing that looks like a way to identify the file is at the end of the file. It looks like it may be a checksum. Here's what I gathered from the hex editor at the end of the file.
786D4532D08A6A06F14D78EA11C648AC6615C025727D1294AA08F43862CBE529©9AA799BC68761F45F3360FEE03D88665©none©F75C7BCC8FB7E449636AE9E3CB81BC8018FCBF307DE1A881765C0A1CBCB65339©193971605©11©3©0©2©32©0© 202©<tkk>
My other hex editor shows the copyright symbols as dots
786D4532D08A6A06F14D78EA11C648AC6615C025727D1294AA08F43862CBE529.9AA799BC68761F45F3360FEE03D88665.none.F75C7BCC8FB7E449636AE9E3CB81BC8018FCBF307DE1A881765C0A1CBCB65339.193971605.11.3.0.2.32.0. 202.<tkk>
Is there a way I can run a decrypt command with trying all the available encryption types using the password I have? Or at least identify how this file was made and what it is?
One odd thing, I ran df -T myfile.~enc
and it says ext4 type filesystem. I tried to mount it but that didn't work. So maybe that's just a fluke.
Oh, maybe the file name would be a hint. It's 021405631868CFACCB0C965D0AF04738ABDCB012CEEAC9C583B2A49CDFEE75BE296b.~enc