Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Tools
  3. Hash Cracking
  4. phantom_pwn - Phantom Vault Extractor & Decryptor

phantom_pwn - Phantom Vault Extractor & Decryptor

Scheduled Pinned Locked Moved Hash Cracking
24 Posts 9 Posters 1.3k Views 9 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by cyclone
    #1

    Title: phantom_pwn
    Author: cyclone
    URL: https://github.com/cyclone-github/phantom_pwn
    Description: Toolset to recover, extract and decrypt Phantom crypto vaults/wallets.

    Readme Card

    GitHub issues License GitHub release

    Phantom Vault Extractor & Decryptor

    POC tools to recover, extract and decrypt Phantom vaults

    This toolset is proudly the first publicly released Phantom Vault Extractor and Decryptor

    • Contact me at https://forum.hashpwn.net/user/cyclone if you need help recovering your Phantom wallet password or seed phrase

    Writeup of my process of decrypting Phantom Wallets and recovering the seed phrase

    • https://github.com/cyclone-github/writeups/blob/main/Pwning Phantom Wallets.pdf

    Phantom vault location for Chrome extensions:

    • Linux: /home/$USER/.config/google-chrome/Default/Local\ Extension\ Settings/bfnaelmomeimhlpmgjnjophhpkkoljpa/
    • Mac: Library>Application Support>Google>Chrome>Default>Local Extension Settings>bfnaelmomeimhlpmgjnjophhpkkoljpa
    • Windows: C:\Users\$USER\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa\

    Extractor usage example on test vault: (plaintext is password)

    • Old pbkdf2 KDF
    ./phantom_extractor.bin bfnaelmomeimhlpmgjnjophhpkkoljpa/
     ----------------------------------------------------- 
    |        Cyclone's Phantom Vault Hash Extractor       |
    |        Use Phantom Vault Decryptor to decrypt       |
    |    https://github.com/cyclone-github/phantom_pwn    |
     ----------------------------------------------------- 
    {"encryptedKey":{"digest":"sha256","encrypted":"5pLvA3bCjNGYBbSjjFY3mdPknwFfp3cz9dCBv6izyyrqEhYCBkKwo3zZUzBP44KtY3","iterations":10000,"kdf":"pbkdf2","nonce":"NZT6kw5Cd5VeZu5yJGJcFcP24tnmg4xsR","salt":"A43vTZnm9c5CiQ6FLTdV9v"},"version":1}
     ----------------------------------------------------- 
    |          hashcat -m 30010 hash (pbkdf2 kdf)         |
     ----------------------------------------------------- 
    $phantom$SU9HoVMjb1ieOEv18nz3FQ==$7H29InVRWVbHS4WcBJdTay0ONb4mLX9Q$g0vJAbflhH4jJJDvuv7Ar5THgzBmJ8tt6oajsQZd/dSXNNjcY5/0eGeF5c1NW1WU
     ----------------------------------------------------- 
    |          hashcat -m 26651 hash (pbkdf2 kdf)         |
     ----------------------------------------------------- 
    PHANTOM:10000:SU9HoVMjb1ieOEv18nz3FQ==:7H29InVRWVbHS4WcBJdTay0ONb4mLX9Q:g0vJAbflhH4jJJDvuv7Ar5THgzBmJ8tt6oajsQZd/dSXNNjcY5/0eGeF5c1NW1WU
    
    • New scrypt KDF
    ./phantom_extractor.bin bfnaelmomeimhlpmgjnjophhpkkoljpa/
     ----------------------------------------------------- 
    |        Cyclone's Phantom Vault Hash Extractor       |
    |        Use Phantom Vault Decryptor to decrypt       |
    |    https://github.com/cyclone-github/phantom_pwn    |
     ----------------------------------------------------- 
    {"encryptedKey":{"digest":"sha256","encrypted":"37fJoKsB9vwnKEzPgc2AHtYVsPTTzrXdTGacbgWxLxbiS7Ri3P3iNnf8csaKwJ4wpk","iterations":10000,"kdf":"scrypt","nonce":"49aomus4HiKLyg7F66pSinR4tpuUuJDHX","salt":"M1PMFn4p4gdCxZDzf8qX71"},"version":1}
     ----------------------------------------------------- 
    |          hashcat -m 26650 hash (scrypt kdf)         |
     ----------------------------------------------------- 
    PHANTOM:4096:8:1:ogSL4J4xP/wNbAjiA8Q4hA==:Iofs3VYyyaYFzHVkcMsnpkrjGQ2+Kni2:OacHaTJAM8dD7XJIj5bGMU3cM8QW3u92n+ngYjXsgRSR20FDnkMLQHTgPxJDefOx
    
    

    Decryptor usage example:

     ----------------------------------------------- 
    |       Cyclone's Phantom Vault Decryptor       |
    | https://github.com/cyclone-github/phantom_pwn |
     ----------------------------------------------- 
    
    Vault file:     hash.txt
    Valid Vaults:   1
    CPU Threads:    16
    Wordlist:       wordlist.txt
    2024/11/30 14:11:35 Working...
    {"encryptedKey":{"digest":"sha256","encrypted":"5pLvA3bCjNGYBbSjjFY3mdPknwFfp3cz9dCBv6izyyrqEhYCBkKwo3zZUzBP44KtY3","iterations":10000,"kdf":"pbkdf2","nonce":"NZT6kw5Cd5VeZu5yJGJcFcP24tnmg4xsR","salt":"A43vTZnm9c5CiQ6FLTdV9v"},"version":1}:password
    2024/11/30 14:11:39 Decrypted: 1/1 6181.36 h/s 00h:00m:03s
    
    2024/11/30 14:11:39 Finished
    
    

    Decryptor supported options:

    -w {wordlist} (omit -w to read from stdin)
    -h {phantom_wallet_hash}
    -o {output} (omit -o to write to stdout)
    -t {cpu threads}
    -s {print status every nth sec}
    
    -version (version info)
    -help (usage instructions)
    
    ./phantom_decryptor.bin -h {phantom_wallet_hash} -w {wordlist} -o {output} -t {cpu threads} -s {print status every nth sec}
    
    ./phantom_decryptor.bin -h phantom.txt -w wordlist.txt -o cracked.txt -t 16 -s 10
    
    cat wordlist | ./phantom_decryptor.bin -h phantom.txt
    
    ./phantom_decryptor.bin -h phantom.txt -w wordlist.txt -o output.txt
    

    Decryptor credits:

    • Shoutout to blandyuk for his help with research - https://github.com/blandyuk
    • https://github.com/renfeee/spl-token-wallet/blob/master/src/utils/wallet-seed.js

    Compile from source:

    • This assumes you have Go and Git installed
      • git clone https://github.com/cyclone-github/phantom_pwn.git
      • phantom_extractor
      • cd phantom_pwn/phantom_extractor
      • go mod init phantom_extractor
      • go mod tidy
      • go build -ldflags="-s -w" .
      • phantom_decryptor
      • cd phantom_pwn/phantom_decryptor
      • go mod init phantom_decryptor
      • go mod tidy
      • go build -ldflags="-s -w" .
    • Compile from source code how-to:
      • https://github.com/cyclone-github/scripts/blob/main/intro_to_go.txt

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    👍
    2
    • F Offline
      F Offline
      freeordead
      wrote on last edited by
      #2

      Hi, first of all thank you for creating this tool - i've been trying to get into a phantom wallet I had on an old desktop hard drive all year with different methods to no avail. I'm not a coder/developer so all this stuff is a little foreign to me and after spending the evening watching different tutorials i've hit an impasse. when i try to run phantom_extractor.go in visual studio code, I receive: Error: Phantom vault directory is required I'm using windows and know the directory is "C:\Users$USER\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa" but i'm not sure where to define or include that in the .go file

      if anyone can point me towards a solution or a more cohesive tutorial for beginners to this stuff i would be forever greatful. thanks!

      1 Reply Last reply
      👍
      0
      • cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by
        #3

        Make sure you read through all the information in the GitHub repo as it gives specific details on how to compile and run the toolset. The .go file is the source code which only needs compiled and run.
        https://github.com/cyclone-github/phantom_pwn

        Double check you have the wallet location in your command.
        ex:

        phantom_extractor.exe "path_to_your_wallet\bfnaelmomeimhlpmgjnjophhpkkoljpa"
        

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • F Offline
          F Offline
          freeordead
          wrote on last edited by
          #4

          thanks for this, i've managed to get the extractor compiled but based on the readme/github writeup i'm not sure what my next steps would be, it looks like an .exe file was created in the phantom_pwn directory. here's what i see right now: https://imgur.com/a/51OXTuw

          i might be in over my head on this, hate to be a bother but any direction would mean the world, i really have tried to decipher the writeups and i'm just not sure what commands i'm looking for.

          1 Reply Last reply
          0
          • cycloneC Offline
            cycloneC Offline
            cyclone
            Admin Trusted
            wrote on last edited by
            #5

            DM sent.

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote on last edited by cyclone
              #6

              Fixed issue with Windows new line control characters, plus added several performance optimizations.
              Source code:
              https://github.com/cyclone-github/phantom_pwn/tree/main/phantom_decryptor
              Release:
              https://github.com/cyclone-github/phantom_pwn/releases/tag/v0.1.5
              Issue Resolved:
              https://github.com/cyclone-github/phantom_pwn/issues/6

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              2
              • F Offline
                F Offline
                freeordead
                wrote on last edited by
                #7

                shoutout to @cyclone !! he spent a good chunk of time and helped me recover the seed phrase for a wallet i've been trying to recover over the past year - true professional, much love g

                1 Reply Last reply
                🍻
                2
                • B Offline
                  B Offline
                  billyjon123
                  wrote on last edited by
                  #8

                  Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

                  cycloneC 1 Reply Last reply
                  0
                  • B billyjon123

                    Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

                    cycloneC Offline
                    cycloneC Offline
                    cyclone
                    Admin Trusted
                    wrote on last edited by
                    #9

                    @billyjon123 I recognize your username from GitHub. DM sent.

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    0
                    • C Offline
                      C Offline
                      cryptuhstonks
                      wrote on last edited by
                      #10

                      Hi Cyclone,

                      Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

                      cycloneC 1 Reply Last reply
                      0
                      • C cryptuhstonks

                        Hi Cyclone,

                        Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

                        cycloneC Offline
                        cycloneC Offline
                        cyclone
                        Admin Trusted
                        wrote on last edited by
                        #11

                        @cryptuhstonks Read through this GitHub issue and DM me if you run into any snags.
                        https://github.com/cyclone-github/phantom_pwn/issues/14#issuecomment-2613081472

                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                        3x RTX 4090

                        1 Reply Last reply
                        0
                        • cycloneC Offline
                          cycloneC Offline
                          cyclone
                          Admin Trusted
                          wrote on last edited by
                          #12

                          Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                          3x RTX 4090

                          JohnJ 1 Reply Last reply
                          👍
                          2
                          • cycloneC cyclone

                            Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

                            JohnJ Offline
                            JohnJ Offline
                            John
                            Contributor
                            wrote on last edited by
                            #13

                            @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

                            30010, 26650 and 26651

                            Without these cores the program won't work? I understand it works in conjunction with hashcat?

                            cycloneC 1 Reply Last reply
                            0
                            • JohnJ John

                              @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

                              30010, 26650 and 26651

                              Without these cores the program won't work? I understand it works in conjunction with hashcat?

                              cycloneC Offline
                              cycloneC Offline
                              cyclone
                              Admin Trusted
                              wrote on last edited by
                              #14

                              @John phantom_extractor extracts the Phantom wallet vault into compatible hashes for either phantom_decryptor or hashcat modes 30010, 26650, 26651. Keep in mind, I do not own those hashcat kernels, so if you need them, you'll have to purchase them directly from the developers.

                              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                              3x RTX 4090

                              1 Reply Last reply
                              👍
                              0
                              • A Offline
                                A Offline
                                ar7s
                                wrote on last edited by
                                #15

                                Hey my ffriend! thanks for that tool, you are awesome. Can you please help me a little bit? i have done almost everything but im not sure if i need to know my password in order to unlock the wallet or to recover the seed phrse.

                                thanks in advance

                                1 Reply Last reply
                                0
                                • A Offline
                                  A Offline
                                  ar7s
                                  wrote on last edited by
                                  #16

                                  hey there, where can i dm you

                                  cycloneC 1 Reply Last reply
                                  0
                                  • A ar7s

                                    hey there, where can i dm you

                                    cycloneC Offline
                                    cycloneC Offline
                                    cyclone
                                    Admin Trusted
                                    wrote on last edited by
                                    #17

                                    @ar7s DM sent.

                                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                    3x RTX 4090

                                    1 Reply Last reply
                                    0
                                    • R Offline
                                      R Offline
                                      rickyc2024
                                      Banned
                                      wrote on last edited by
                                      #18

                                      @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                                      cycloneC 1 Reply Last reply
                                      0
                                      • R Offline
                                        R Offline
                                        rickyc2024
                                        Banned
                                        wrote on last edited by
                                        #19

                                        I also noticed that the structure of solflare vault data is almost identical to the structure of phantom but it doesn't seem to be using the wallet password.

                                        1 Reply Last reply
                                        0
                                        • R rickyc2024

                                          @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                                          cycloneC Offline
                                          cycloneC Offline
                                          cyclone
                                          Admin Trusted
                                          wrote on last edited by
                                          #20

                                          @rickyc2024 DM sent.

                                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                          3x RTX 4090

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          Who's Online [Full List]

                                          5 users active right now (2 members and 3 guests).
                                          hashpwn-bot, freeroute

                                          Board Statistics

                                          Our members have made a total of 3.3k posts in 150 topics.
                                          We currently have 256 members registered.
                                          Please welcome our newest member, thatux.
                                          The most users online at one time was 49 on Thursday, December 26, 2024.

                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent