Hi there,
I have a physical extraction of a Huawei Mediapad M5. There is a Huawei SafeBox in use i don't know the password of. Data is located in data\media\0\File_SafeBox\.File_SafeBox\SOMEHASH
Â
Inside there are encrypted files and a "msb.db" containing a table for metadata like original filenames/size aso. and a table with one line of hashes and hexdata. Seems to be encrypted/hashes password and/or IVs.
Before beginning to reverse the SafeBox App...... does anybody have an idea or a script ready to decrypt the files or bruteforce the password?
Â
Thanks in advance.
The minimum requirements for a File Safe password is 6 characters, where at least one must be a letter. Bruteforcing such password would take years unless you got limited with good dictionary - it's still AES256 with XTS.....
At the moment no tool offers decryption of Safe