02-21-2022, 02:19 PM
Hi Guys,
I am looking forward to cracking a exodus wallet seco file ( https://github.com/ExodusMovement/secure-container ) using a dictionary attack(already prepared list with just 5000 phrases).
As per https://github.com/hashcat/hashcat/issues/3025 support for seco files was added recently and is available in the current beta version. I vaguely remember the ~17 characters of the password, however I forgot the exact variation. Very confident that I can crack it !, but I NEED HELP
I want to know which hash-mode to use and how to interact with these .seco files (I think I need to create their hash, don't know how?) in hashcat.
Regards,
Specific-user666
I am looking forward to cracking a exodus wallet seco file ( https://github.com/ExodusMovement/secure-container ) using a dictionary attack(already prepared list with just 5000 phrases).
As per https://github.com/hashcat/hashcat/issues/3025 support for seco files was added recently and is available in the current beta version. I vaguely remember the ~17 characters of the password, however I forgot the exact variation. Very confident that I can crack it !, but I NEED HELP
I want to know which hash-mode to use and how to interact with these .seco files (I think I need to create their hash, don't know how?) in hashcat.
Regards,
Specific-user666