Take the encrypted Vault file(s) and password (or password list) and attempt to decrypt the wallet(s)
Obtain the Vault file from the Browser Extension in following location:
-
Firefox
moz-extension://UUID/home.html
(right click) inspect elementchrome.storage.local.get('data', result=> {var vault=result.data.KeyringController.vault; console.log(vault)})
-
Chrome
In an explorer window:
%LocalAppData%\\Google\\Chrome\\UserData\\Default\\Local Extension Settings\\nkbihfbeogaeaoehlefnkodbefgpgknn
Ideally parse the LevelDB (eg LevelDBDumper) and output the json Alternatively, search all *.ldb files for "vault" and extract the json
- Mobile
/private/var/mobile/[Application]/persistStore/persist-root
Please note, Metamask enforces a minimum password length of 8 characters, shorter passwords will be ignored by the script.
See the following link for further details on extracting the vault:
python decrypt_metamask_vault.py -p passwordlist vaultfile
- parse levelDB
- parse vaults pasted in the command line