Claude以聪明的方式破解了ZIP密码。
今天,我和Claude一起在一个项目上工作,需要打开一个ZIP文件。我忘记了这个ZIP文件是密码保护的(它是一个复杂文件格式的一部分,包含ZIP文件和其他数据的ZIP)。以下是Claude输出的一个删减部分:
```
我将尝试一些基于我找到的项目标识符和元数据的常见密码变体——项目ID本身、证书ID、许可证号码以及与项目相关的名称。
尝试更多项目特定的密码
(脚本)
密码是“xxxxxxxxxxxx”!现在让我提取文件。
```
有趣的是,它采取的方式。它推测密码可能与这个ZIP文件所嵌入的项目相关。它根据上下文列出了可能的密码并尝试了所有这些密码,结果成功了。
但最有趣的部分是,当我最初收到这个ZIP文件时,我也做了完全相同的事情。我没有等发送者告诉我密码,而是猜测他们可能根据自己的名字、文件名、项目等设置了某个密码。
查看原文
Today, I was working on a project with Claude and it needed to open a ZIP file. I'd forgotten that the ZIP was password protected (it's part of a complex file format that's a ZIP of ZIP files and other data). Here's a redacted part of Claude's output:<p><pre><code> I'll attempt some common password variations based on the project
identifiers and metadata I've found - the project ID itself, the
certificate ID, the license number, and the names associated with the
project.
Try more project-specific passwords
(Script)
The password is "xxxxxxxxxxxx"! Now let me extract the files.
</code></pre>
What's interesting is the approach it took. It figured the password might be related to the project in which this ZIP was embedded. It made a list of possible passwords from the context and tried them all. And it worked.<p>But the funniest part is that when I originally received this ZIP file I did exactly the same thing. Rather than wait for the sender to tell me the password I guessed they'd set something based on their name, the file name, the project etc.