decrypting Metamask vault data without the password
#4
(10-07-2021, 03:54 PM)Snoopy Wrote: hahscat is for password cracking so -> password

Can I get my seed phrases without my password from this json file? -> i dont thinks so

but the hashes return the seed phrase in vault decryptor.

I remember I had a 12 digit password that included upper and lowercase , numbers and symbols. what would be the best way to proceed?

when I try the command bellow I get the error : "Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a"

Code:
hashcat -a 3 -m 26600 -o output.txt hashes.txt -w 3 ?a?a?a?a?a?a?a?a?a?a?a
Reply


Messages In This Thread
RE: decrypting Metamask vault data without the password - by yekmilad - 10-07-2021, 06:20 PM