Skip to content
This repository has been archived by the owner on Feb 10, 2023. It is now read-only.

jselvi/AndroidPINCrack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

DEPRECATED! This script has not been used since 2015 or before, so it may not work in modern Android devices. ARCHIVED.

AndroidPINCrack is a Python script that bruteforce the Android Passcode given the hash and salt. Of course there are some other faster ways to crack than a python script, but it can be useful for numeric passcoders or wordlist attack.

$ ./AndroidPINCrack.py 
Usage: AndroidPINCrack.py [options]

Options:
  -h, --help                                   show this help message and exit
  -H HASH, --hash=HASH                         password.key hash
  -s SALT, --salt=SALT                         Hash salt
  -m MODEL, --model=MODEL                      Android Version/Model
  -c CHARSET, --charset=CHARSET                Password charset to test (default=numeric)
  -l LENGTH, --length=LENGTH                   Passcode max length (default=4)
  -w WORDLIST_FILE, --wordlist=WORDLIST_FILE   wordlist file

By default, it bruteforces numeric 4-length passwords:

$ ./AndroidPINCrack.py -H DC6831BFE0B8563B82A8AAB9CB5B294BD4B3072A93AF306 -s 7026104367013576733
Found! Passcode = 0101

It seems that Samsung has modified the hashing algorithm, so you need to use the proper flag:

$ ./AndroidPINCrack.py -H DC59AACF2AFCE72E737190323022FFB6E2831446 -s 988796901418269782 -m samsung
Found! Passcode = 1234

You can use some other flags, such as a wordlist instead of bruteforcing:

$ ./AndroidPINCrack.py -H DC59AACF2AFCE72E737190323022FFB6E2831446 -s 988796901418269782 -m samsung -w wordlist.txt
Found! Passcode = 1234

About

Bruteforce the Android Passcode given the hash and salt.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages