12-09-2021, 04:00 AM
Hi,
First of all I want to say thanks. Started my short hashcat journey a week ago to resolve a password to an old wallet file for Ethereum.
I struggled a bit to find the exact combined solution so I wanted to write this post in case it comes up for other users while searching.
Mods: please feel free to delete if this doesn't add value to the forum.
My passwords tend to follow a predictable pattern. Some symbols, some letters, some numbers and some more symbols.
I first made a list of all the words I commonly used in passwords over the last 10 years. This turned out to be less than 100 words. I put these in a text file which was called text.txt and put it in the same folder as hashcat main executable file.
I then created a rule set using the wiki documents. This would modify each text be adding the symbols before it and then adding some numbers, symbols at the end of it.
I put each rule on a different line. Saved this as rule.txt and also placed it in the same folder.
Then (with help from searching the forums and the wiki and discord) I put in the following command in hashcat:
hashcat -a 0 text.txt -r rule.txt --stdout -o output.txt
This created an output.txt file of several thousand passwords that combined my words with all kinds of numbers and symbols that I would normally use when creating a password. This is what will be used in the crack.
It is funny when you look at that output file you realize that many of those passwords could've been my password.
I converted my Ethereum wallet keystore information into the correct format using the same approach as this website:
https://stealthsploit.com/2017/06/12/eth...-cracking/
which is basically: `$ethereum$s*n*r*p*salt*ciphertext*mac`
I saved this in a text file called hasheth.txt and put this in the same folder as the other text files mentioned above.
I then ran the following command:
hashcat -w 3 -m 15700 hasheth.txt output.txt
About 70% through the process I got my successful cracked password notification.
Thank you folks
First of all I want to say thanks. Started my short hashcat journey a week ago to resolve a password to an old wallet file for Ethereum.
I struggled a bit to find the exact combined solution so I wanted to write this post in case it comes up for other users while searching.
Mods: please feel free to delete if this doesn't add value to the forum.
My passwords tend to follow a predictable pattern. Some symbols, some letters, some numbers and some more symbols.
I first made a list of all the words I commonly used in passwords over the last 10 years. This turned out to be less than 100 words. I put these in a text file which was called text.txt and put it in the same folder as hashcat main executable file.
I then created a rule set using the wiki documents. This would modify each text be adding the symbols before it and then adding some numbers, symbols at the end of it.
I put each rule on a different line. Saved this as rule.txt and also placed it in the same folder.
Then (with help from searching the forums and the wiki and discord) I put in the following command in hashcat:
hashcat -a 0 text.txt -r rule.txt --stdout -o output.txt
This created an output.txt file of several thousand passwords that combined my words with all kinds of numbers and symbols that I would normally use when creating a password. This is what will be used in the crack.
It is funny when you look at that output file you realize that many of those passwords could've been my password.
I converted my Ethereum wallet keystore information into the correct format using the same approach as this website:
https://stealthsploit.com/2017/06/12/eth...-cracking/
which is basically: `$ethereum$s*n*r*p*salt*ciphertext*mac`
I saved this in a text file called hasheth.txt and put this in the same folder as the other text files mentioned above.
I then ran the following command:
hashcat -w 3 -m 15700 hasheth.txt output.txt
About 70% through the process I got my successful cracked password notification.
Thank you folks