01-04-2023, 03:38 PM
Hi all, I last used my MetaMask wallet 24 moths ago and have since forgotten the password.
I never made note of the seed since I made sure I had the wallet on multiple devices, all devices were wiped overtime leaving me in this bad state.
I have exported the Vault Data just in case the last device fails, but have no idea what my password was.
Spent about a week creating a password text file which has over 40000 variations of possible passwords.
Questions:
1. How can I dictionary attack my exported vault data text file with the password text file?
2. I can use <https://metamask.github.io/vault-decryptor/> offline with exported Vault Data, but need a way to run through the password file or make use of HashCat v6.2.6 with MetaMask Algorithm?
3. Can I see some sample syntax for how to use HashCat v6.2.6 to brute force the vault data file with password file?
Would appreciate tests with below 2 text files, the working password for the below is 12345678:
**TestVault.txt**
{"data":"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","iv":"ek2LsWuW4pVi9CL7GcGy/A==","salt":"VBtV4FsBjEFi4Mt3U9pZiCxvPvp7aCcIzmE8aIOcYY8="}
**TestPassword.txt**
sdgsdg
zsdgasdg
szgasga
sdgzsfdhgzsf
zsfdhszfhshf
zdfhzdfshshf
12345678
I never made note of the seed since I made sure I had the wallet on multiple devices, all devices were wiped overtime leaving me in this bad state.
I have exported the Vault Data just in case the last device fails, but have no idea what my password was.
Spent about a week creating a password text file which has over 40000 variations of possible passwords.
Questions:
1. How can I dictionary attack my exported vault data text file with the password text file?
2. I can use <https://metamask.github.io/vault-decryptor/> offline with exported Vault Data, but need a way to run through the password file or make use of HashCat v6.2.6 with MetaMask Algorithm?
3. Can I see some sample syntax for how to use HashCat v6.2.6 to brute force the vault data file with password file?
Would appreciate tests with below 2 text files, the working password for the below is 12345678:
**TestVault.txt**
{"data":"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","iv":"ek2LsWuW4pVi9CL7GcGy/A==","salt":"VBtV4FsBjEFi4Mt3U9pZiCxvPvp7aCcIzmE8aIOcYY8="}
**TestPassword.txt**
sdgsdg
zsdgasdg
szgasga
sdgzsfdhgzsf
zsfdhszfhshf
zdfhzdfshshf
12345678