decrypting Metamask vault data without the password
#8
Quote:
Quote:when I try the command bellow I get the error : "Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a"
Code:
hashcat -a 3 -m 26600 -o output.txt hashes.txt -w 3 ?a?a?a?a?a?a?a?a?a?a?a

if you have no clue about your own password, it will be nearly impossible to brutefoce this lenght/kind of password in any time, just do some math

95 possible chars ^12 = 540.360.090.000.000.000.000.000
(i dont have a real cracking rig, so i used benchmark and multiplied my output by 1000!)
even with this i ONLY could test 100.000.000 (100 Million) candidates per second this means it would last 171.347.059 YEARS so 171 Millions of Years to test your 12 char password

I have two clues. first I know it's exactly 12 chars lengths. not less or more.
Secondly it definitely contains all lower and upper case , numbers and symbols. maybe this will reduce a couple of million years; because passwords with only numbers and letters wouldn't count. also passwords with letters and symbols wouldn't count or numbers and symbols. it should contain all of them.

still it seems like a lot of years.
but maybe I should wait for quantum computers to arrive. 

thanks for the help/
Reply


Messages In This Thread
RE: decrypting Metamask vault data without the password - by yekmilad - 10-21-2021, 10:47 AM