hashcat Forum
Decrypting Chrome's Login Data password entries - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Decrypting Chrome's Login Data password entries (/thread-11790.html)



Decrypting Chrome's Login Data password entries - Macilacikommando - 01-27-2024

Hi!

After an SSD went south, I recovered my user's chromium config folder, but the keyring entry (chrome_libsecret_os_crypt_password_v2) is sadly nonrecoverable. I have the passwords from chromium's Login Data credentials file, but the keyring file, that's needed for the encryption is a 22-24 char long Base64 encoded string, is sadly missing. 


The entry looks like this, is there any way for me to brute force this with Hashcat or considering the length of the pw (22^64), it's a dead cow?

X'7631314f36e73bde27cbfd388d83ae43f7aa42'

Thanks


RE: Decrypting Chrome's Login Data password entries - Banaanhangwagen - 01-29-2024

in order to recover the saved passwords from the Chromium browser you need the "Login Data" and the "storagekey", as found in the Keychain-application of the mac.
(you can retrieve this key with a simple command)

The storagekey is, after decoding, 32 bytes long. That gives 16^32 possibilities, which is not feasible to crack bruteforce-wise.


RE: Decrypting Chrome's Login Data password entries - Macilacikommando - 01-29-2024

(01-29-2024, 12:36 AM)Banaanhangwagen Wrote: in order to recover the saved passwords from the Chromium browser you need the "Login Data" and the "storagekey", as found in the Keychain-application of the mac.
(you can retrieve this key with a simple command)

The storagekey is, after decoding, 32 bytes long. That gives 16^32 possibilities, which is not feasible to crack bruteforce-wise.

Sigh, thanks. Then it's a lost effort.