Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: What about crypt8 ?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Commonly used by Whatsapp (android/iphone), the conversation database file called msgstore.db.crypt8 can be decrypted with a key file (android : /data/data/com.whatsapp/files/key) which contains an initialization vector and an AES-256-CBC key.

From my research I did not find any tool to bruteforce this file - without the key, of course.

Any toughs on this ?
Could hashcat able to do it in future versions ?

Thanks.
This sounds interessting, but we need all details and some example data
Perhaps this?
https://www.digitalinternals.com/security...droid/374/

Generic PBKDF2-HMAC-SHA1 should do.
Looks interessting. Mem5 is it what you're looking for? In that case please open up a trac ticket