decrypting Metamask vault data without the password
(10-07-2021, 06:20 PM)yekmilad Wrote:
(10-07-2021, 03:54 PM)Snoopy Wrote: hahscat is for password cracking so -> password

Can I get my seed phrases without my password from this json file? -> i dont thinks so

but the hashes return the seed phrase in vault decryptor.

yeah IF you provide the proper password

Quote:when I try the command bellow I get the error : "Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a"
hashcat -a 3 -m 26600 -o output.txt hashes.txt -w 3 ?a?a?a?a?a?a?a?a?a?a?a

if you have no clue about your own password, it will be nearly impossible to brutefoce this lenght/kind of password in any time, just do some math

95 possible chars ^12 = 540.360.
(i dont have a real cracking rig, so i used benchmark and multiplied my output by 1000!)
even with this i ONLY could test 100.000.000 (100 Million) candidates per second this means it would last 171.347.059 YEARS so 171 Millions of Years to test your 12 char password

Messages In This Thread
RE: decrypting Metamask vault data without the password - by Snoopy - 10-08-2021, 04:01 PM