Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Passwd Hash Length - Blockchain.info #55

Closed
2b3pro opened this issue May 20, 2017 · 5 comments
Closed

Passwd Hash Length - Blockchain.info #55

2b3pro opened this issue May 20, 2017 · 5 comments

Comments

@2b3pro
Copy link

2b3pro commented May 20, 2017

Suppose I have both the hashes for my main password and my second password for a blockchain.info wallet. Do the lengths of the hashes indicate whether one password is possibly longer than the other? Currently the 2nd hash is longer than the 1st. Thoughts?

@gurnec
Copy link
Owner

gurnec commented Jun 1, 2017

I'm afraid I don't understand....

A Blockchain,info wallet file doesn't contain the hash of the main password. The only way to check if the main password is correct is to attempt to decrypt the wallet file using the main password, and see if the result looks like JSON plaintext.

Once decrypted, the JSON plaintext does contain the hash of the second password (it's called the dpasswordhash), but that still leaves me a bit confused...?

@2b3pro
Copy link
Author

2b3pro commented Jun 1, 2017

Sorry, please disregard the question. I was trying to brute force the second password, and wondered if the hash of the second password obtained via the extract scripts gave me any clue about possible password length. Thank you for your time.

@2b3pro 2b3pro closed this as completed Jun 1, 2017
@gurnec
Copy link
Owner

gurnec commented Jun 1, 2017

I definitely misunderstood, but now I understand what you were asking. Although you don't need the answer any longer, just for the record it's "no", there's no way to deduce the password length from any of the data retrieved by the various extract scripts.

@cprkrn
Copy link

cprkrn commented Sep 10, 2018

Sorry if this isn't the right place- I have the first password, 2fa, and the second password hash. Trying to use hashcat to undo the hash with these:

1400 | SHA-256 | Raw Hash
1410 | sha256($pass.$salt) | Raw Hash, Salted and/or Iterated
1420 | sha256($salt.$pass) | Raw Hash, Salted and/or Iterated
1430 | sha256(utf16le($pass).$salt) | Raw Hash, Salted and/or Iterated
1440 | sha256($salt.utf16le($pass)) | Raw Hash, Salted and/or Iterated

Just wondering if this is even possible or if I'm wasting my time here. Feels like I'm really close to cracking it but it's too long of a password for me to bruteforce locally.

Related: https://stackoverflow.com/questions/37181281/how-do-you-keep-track-of-your-comments-in-issues-on-github

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants
@2b3pro @gurnec @cprkrn and others