Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Hash Cracking / Recovery
  3. Crypto Currency: $bitcoin$ $metamask$ $electrum$ $ethereum$ $blockchain$, etc.
  4. Cracking metamask hash

Cracking metamask hash

Scheduled Pinned Locked Moved Crypto Currency: $bitcoin$ $metamask$ $electrum$ $ethereum$ $blockchain$, etc.
12 Posts 4 Posters 804 Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D Offline
    D Offline
    dbgdbg
    wrote on last edited by cyclone
    #3
    This post is deleted!
    1 Reply Last reply
    0
    • D Offline
      D Offline
      dbgdbg
      wrote on last edited by
      #4

      Please delete the upper message ill rather attach a txt file, accidentaly deleted the post.

      metamask.txt

      It would be excellent if you manage to elaborate how to transform this into a crackable 26600 hash format OR manage to get it working with 26620 kernel mode. Password is catanddog if you want to go with a shorter wordlist.

      cycloneC 1 Reply Last reply
      0
      • D dbgdbg

        Please delete the upper message ill rather attach a txt file, accidentaly deleted the post.

        metamask.txt

        It would be excellent if you manage to elaborate how to transform this into a crackable 26600 hash format OR manage to get it working with 26620 kernel mode. Password is catanddog if you want to go with a shorter wordlist.

        cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by
        #5

        @dbgdbg Deleted as requested. The issue was you need to comment out any lines that contain markdown code.
        example:

        commented out line
        

        The tool already gave you a crackable hash under hashcat -m 26620 hash (NEW format):

        $metamask$600000$xsq1OyKYinxYyiOUWyTVT820oedGQy+smC7EufhhEEg=$UuT70j+fJnU2tLU4bxZ35g==$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
        

        hashcat output running -m 26620:

        Session..........: 134659                                 
        Status...........: Cracked
        Hash.Mode........: 26620 (MetaMask Wallet (needs all data, checks AES-GCM tag))
        Hash.Target......: $metamask$600000$xsq1OyKYinxYyiOUWyTVT820oedGQy+smC...Anjw==
        Time.Started.....: Tue Nov 25 13:47:25 2025 (2 secs)
        Time.Estimated...: Tue Nov 25 13:47:27 2025 (0 secs; Runtime limited: 59 mins, 58 secs)
        Kernel.Feature...: Pure Kernel
        Guess.Base.......: File (/home/cyclone/tmp/134659.wordlist.txt)
        Guess.Queue......: 1/1 (100.00%)
        Speed.#1.........:        1 H/s (1.24ms) @ Accel:8 Loops:512 Thr:512 Vec:1
        Speed.#2.........:        0 H/s (0.00ms) @ Accel:8 Loops:512 Thr:512 Vec:1
        Speed.#*.........:        1 H/s
        Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
        Progress.........: 1/1 (100.00%)
        Rejected.........: 0/1 (0.00%)
        Restore.Point....: 0/1 (0.00%)
        Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:599552-599999
        Restore.Sub.#2...: Salt:0 Amplifier:0-0 Iteration:0-512
        Candidate.Engine.: Host Generator + PCIe
        Candidates.#1....: catanddog -> catanddog
        Candidates.#2....: [Copying]
        Hardware.Mon.#1..: Temp: 44c Fan: 31% Util: 95% Core:2775MHz Mem:10251MHz Bus:1
        Hardware.Mon.#2..: Temp: 44c Fan: 32% Util:  0% Core:2805MHz Mem:10251MHz Bus:1
        Started: Tue Nov 25 13:47:21 2025
        Stopped: Tue Nov 25 13:47:28 2025
        

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Offline
          cycloneC Offline
          cyclone
          Admin Trusted
          wrote on last edited by
          #6

          If you're having issues getting hashcat working with the -m 26620 kernel, make sure you're following the directions on where to place the kernel / module files, then compile hashcat.
          hashcat_26620_kernel
          https://github.com/cyclone-github/hashcat_26620_kernel

          If you're not able to get that working, you can download my hashcat v6.2.6 fork which comes pre-compiled with the -m 26620 kernel.
          https://github.com/cyclone-github/hashcat/releases/tag/hashcat-6.2.6_cyclone-24-11-18

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          0
          • D Offline
            D Offline
            dbgdbg
            wrote on last edited by
            #7

            Works like a charm, thank you big time. Will try to compile my own version aswell, if any problems appear i shall return to this post.

            1 Reply Last reply
            🍻
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote on last edited by
              #8

              You're welcome, and glad you got it figured out.

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              0
              • cycloneC cyclone

                Keep in mind that hashcat v7.x recently added support for their own metamask wallet hash with dynamic iterations which is not compatible with the widely used 26620 kernel which I released back in March, 2024.

                Now, to address your question:
                The metamask_extractor will print two hashes:

                1. metamask_decryptor format (can recover the password and seed phrase)
                {"data": "","iv": "","keyMetadata": {"algorithm": "PBKDF2","params": {"iterations": }},"salt": ""}
                
                1. hashcat 26600 or 26620 format (can be run with hashcat to recover only the password)
                $metamask$600000$...$...$...
                

                If you're still needing more help, post your test wallet output from metamask_extractor and we'll go from there (make sure to only post a test wallet with no balance and not a real wallet).

                C Offline
                C Offline
                chpost
                wrote on last edited by
                #9

                @cyclone said in Cracking metamask hash:

                Keep in mind that hashcat v7.x recently added support for their own metamask wallet hash with dynamic iterations which is not compatible with the widely used 26620 kernel which I released back in March, 2024.

                I guess, it is compatible, but hash string should be changed from

                $metamask$600000$...$...$...
                

                to

                $metamask$rounds=600000$...$...$...
                
                cycloneC 1 Reply Last reply
                👍
                0
                • C chpost

                  @cyclone said in Cracking metamask hash:

                  Keep in mind that hashcat v7.x recently added support for their own metamask wallet hash with dynamic iterations which is not compatible with the widely used 26620 kernel which I released back in March, 2024.

                  I guess, it is compatible, but hash string should be changed from

                  $metamask$600000$...$...$...
                  

                  to

                  $metamask$rounds=600000$...$...$...
                  
                  cycloneC Offline
                  cycloneC Offline
                  cyclone
                  Admin Trusted
                  wrote on last edited by
                  #10

                  @chpost It's not compatible as is, but yes, if you reparse the hash like your example, it will work.

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  0
                  • Silver0666S Offline
                    Silver0666S Offline
                    Silver0666
                    wrote last edited by
                    #11

                    Hello all members and @cyclone, Happy New Year. Greeting.
                    Regarding the metamask_decryptor, I have some ideas to upgrade it. I tried to use it to crack my old wallet.
                    At first, I used hashcat but 'Token Length Exception' error was occupied so I tried to use your decryptor.
                    But its speed is a bit slow and it's because yours use only CPU, not GPU. If you use CUDA, it would be better to speed up. 🙂
                    Also, we can add mask options like hashcat. Sorry for my suggestions but I really appreciate your tools.
                    Please let me know if you have some solutions for my sugesttions.
                    Thanks

                    1 Reply Last reply
                    0
                    • cycloneC Offline
                      cycloneC Offline
                      cyclone
                      Admin Trusted
                      wrote last edited by
                      #12

                      It is better to use hashcat to recover the wallet password, then use metamask_decryptor to recover the seed phrase. If you're having issues with getting hashcat to work, make sure to use metamask_extractor to properly extract the hash. Several users have run into issues getting hashcat and metamask hashes to work on Windows, so trying yours with hashcat on linux is worth a shot. I have hashcat with my custom 26620 metamask kernel hosted on github which is compatible with the metamask_extractor.
                      https://github.com/cyclone-github/hashcat

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      Who's Online [Full List]

                      9 users active right now (2 members and 7 guests).
                      hashpwn-bot

                      Board Statistics

                      Our members have made a total of 8.4k posts in 167 topics.
                      We currently have 337 members registered.
                      Please welcome our newest member, Umar245.
                      The most users online at one time was 49 on Thursday, December 26, 2024.

                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent