MihaZupan / TelegramStorageParser

Library to decrypt and parse Telegram Desktop's storage
Other
59 stars 20 forks source link

Telegram Desktop Local Passcode #4

Open ZX-zedex opened 5 years ago

ZX-zedex commented 5 years ago

I need to find this passcode in Telegram Desktop, which is stored in the map[0-1] file.

image

I don't have any idea about the length of the password, which characters it contains and the strength of it. Is there any chance to find out it without bruteforce method or maybe replace it in the map[0-1] file with the simplest one (ex. 1234).

Thank you.

MihaZupan commented 5 years ago

If you want access to the files you will have to find out the passcode. JohnTheRipper has support for bruteforcing it.

ZX-zedex commented 5 years ago

Yes. I know. But I can't cause the Desktop version supports various symbols (not just a 4-digit number) and I am not sure that it contains only english characters. Bruteforcing does work but it is very slow and I don't think that in my life it will end)

That's why I wanted to know if there is a way to get the hash of the password maybe one can change the script to replace it with something that you want to input.

Thank you.

MihaZupan commented 5 years ago

You need the actual passcode to further decrypt files. I'm afraid bruteforcing is the only way.

ZX-zedex commented 5 years ago

Hi. Thank you for your reply. Is there any capable settings that can afford to bruteforce the hash with cyrillic symbols (with JTP)?

Thank you

MihaZupan commented 5 years ago

I would not know as I haven't used John the ripper all that much. The community on their github seems helpful though so you should try asking there.