Brute force trx keystore file
#1
I have a keystore file for Tron that I’m looking to access. I have compiled a list of passwords I had from around the time to help narrow down common characteristics

I haven’t seen much specifically dealing with tron, other than it Wa on the ethereum blockchain originally. Is the keystore able to be cracked or is hashcat limited to only certain types of keystore files.

I’m excited to learn and hopeful to regain access!

Thanks!
Reply
#2
is it a .json file? Try it in ethereum2john maybe
Reply
#3
Cmd2002 dateline='[url=tel:1695713034' Wrote: 1695713034[/url]']
is it a .json file? Try it in ethereum2john maybe

I believe it is. I’ll try this out, thanks for the recommendation.
Reply
#4
Cracking cryptocurrency wallets requires a lot more than just calculating a simple hash. Unless it's explicitly implemented for your type of wallet (it's not) you won't be able to attack it with hashcat.

In order to implement it, a lot of details would be needed:
1. how does key calculation work? (simply "something with sha512" doesn't cut it)
2. how is the public key derived from the calculated (private) key?
3. how to compare the address with the public key?
Reply