Posts: 4
	Threads: 1
	Joined: Aug 2023
	
	
 
	
	
		Hi 
I need help to hack Blockchain.com second password
I have the Blockchain second password hash, salt, and iter_count in base64
How I can Decode it?
Or how I use my json file to hack the second password
	
	
	
	
	
 
 
	
	
	
		
	Posts: 383
	Threads: 1
	Joined: Aug 2020
	
	
 
	
	
		Use mode 18800 Blockchain, My Wallet, Second Password (SHA256)
https://hashcat.net/wiki/
	 
 
	
	
	
		
	Posts: 4
	Threads: 1
	Joined: Aug 2023
	
	
 
	
	
		 (08-11-2023, 08:25 AM)marc1n Wrote:  Use mode 18800 Blockchain, My Wallet, Second Password (SHA256)
https://hashcat.net/wiki/
can you write the command?
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 4
	Threads: 1
	Joined: Aug 2023
	
	
 
	
	
		 (08-11-2023, 08:25 AM)marc1n Wrote:  Use mode 18800 Blockchain, My Wallet, Second Password (SHA256)
https://hashcat.net/wiki/
I try this command hashcat -m 18800 wallet.hash 
but I get this error : No password candidates received in stdin mode, aborting
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 383
	Threads: 1
	Joined: Aug 2020
	
	
 
	
	
		 (08-11-2023, 02:43 PM)sasith2 Wrote:   (08-11-2023, 08:25 AM)marc1n Wrote:  Use mode 18800 Blockchain, My Wallet, Second Password (SHA256)
https://hashcat.net/wiki/
I try this command hashcat -m 18800 wallet.hash 
but I get this error : No password candidates received in stdin mode, aborting
You have to see what you want to do mode alone won't help because you have to define a dictionary attack type? btruteforce? you can find the rest here  
https://hashcat.net/wiki/
	 
	
	
	
	
 
 
	
	
	
		
	Posts: 4
	Threads: 1
	Joined: Aug 2023
	
	
 
	
	
		 (08-11-2023, 04:00 PM)marc1n Wrote:   (08-11-2023, 02:43 PM)sasith2 Wrote:   (08-11-2023, 08:25 AM)marc1n Wrote:  Use mode 18800 Blockchain, My Wallet, Second Password (SHA256)
https://hashcat.net/wiki/
I try this command hashcat -m 18800 wallet.hash 
but I get this error : No password candidates received in stdin mode, aborting
You have to see what you want to do mode alone won't help because you have to define a dictionary attack type? btruteforce? you can find the rest here  https://hashcat.net/wiki/
I think that hashcat can decrypt the hash without text file