List of archive types: https://fileinfo.com/filetypes/compressed
To get as txt list:
curl -s <https://fileinfo.com/filetypes/compressed> | html2text | awk '{print tolower($1)}' | grep "\\." | tee -a compressed_ext.txt
.mint
.zhelp
.b6z
.fzpz
.zst
.apz
.ufs.uzip
.vrpackage
...
When cracking OpenSSL encrypted files, there are numerous false positives or complete failure to identify password.
A more reliable approach is to use openssl within a for that attempts to extracts the content directly.
for i in $(cat rockyou.txt);do openssl enc -aes-256-cbc -d -in GZIP.gzip -k $i 2>/dev/null| tar xz;done
bitlocker2john can extract 4 hashes:
1 and 2 represent the Bitlocker password
2 others represent the recovery key (48B)
Hashcat associated mode: 22100
Encryption is AES, and take a lot of time to crack
To get the hash:
bitlocker2john -i Backup.vhd > backup.hashes
# Extract the first bitlocker hash (remove some informational content in the file)
grep "bitlocker\\$0" backup.hashes > backup.hash