11-29-2023, 01:41 PM
I have a Solana wallet that I want to recovery (I have a part of the password), however, there is no Solana specific hash extract script.
If I look at the keystore file, it is similar to existing hashes and attack modes such as:
20200 Python passlib pbkdf2-sha512
21600 Web2py pbkdf2-sha512
There are however other parameters for pbkdf2 that I do not get, the parameters are as follows
Parameters are:
_cipher":"aes-128-ctr_
_cipherparams":{"counter":988485},"kdf":"pbkdf2","kdfparams":{"c":8192,"dklen":32,"prf":"sha512","salt:..."}_
I assume that c is the number of iterations, but what about the counter.
Does anyone know if these parameters can be fed to hashcat using an existing attack mode such as 21600 Web2py pbkdf2-sha512?
If I look at the keystore file, it is similar to existing hashes and attack modes such as:
20200 Python passlib pbkdf2-sha512
21600 Web2py pbkdf2-sha512
There are however other parameters for pbkdf2 that I do not get, the parameters are as follows
Parameters are:
_cipher":"aes-128-ctr_
_cipherparams":{"counter":988485},"kdf":"pbkdf2","kdfparams":{"c":8192,"dklen":32,"prf":"sha512","salt:..."}_
I assume that c is the number of iterations, but what about the counter.
Does anyone know if these parameters can be fed to hashcat using an existing attack mode such as 21600 Web2py pbkdf2-sha512?