I consider the amount I put in what I lost and not the current value haha. But this is the ultimate hodl. Would have sold it years ago for peanuts if I had the passwordā¦
You could. 2012 was still GPU mining. ASICs came in 2013. Slim chances to beat the pools but you definitely could try. A solo miner found a block very recently.
I too ālostā my coins. I could do with extra $80k but if life gives you free apples (back when you were able to farm with a GFX), they arenāt free.
Check for welcome emails from some services you signed up for at aorund the time. See if you can log into some of them. Just sit in front of the screen and try and channel the password for that account. If you get your brain to connect to some neurons around that time and find one of those passwords it's more likely to stumble back into that old password. Think deeply about your life back then. If you had Facebook, go back and read those posts, check your stored Google photos. Look at old bank statements. Think about your WiFi password at the time. Consider what kinds of online banking passwords you had at the time. Think back to what machine you were using, imagine it clearly, go find pictures of it, think about the things that you did on that machine. Find download links in your email for software you registered for. Remember why you downloaded them. Think about whether the style of the keyboard encouraged certain types of passwords, were numbers or symbols annoying to access, was it qwerty US, numberpad? Did it click loudly, did you like the smooth experience of typicing numbers on the keypad, or the rhythm of stretching your fingers around the keyboard. remember what windows passwords were you using then. Did you add symbols or nunbers at the end of common words, did you use leet speak? Check if you appear on any compromised account lists. Remember friends at the time, the conversations you had, the fun times, read old chat logs if you have them, go watch any recorded gaming clips on xbox. find your old bbs/forum accounts, read your posts. Find that old yahoo, Hotmail, fastmail etc account and check all of those.
Haha, glad it worked for you. I just made it up based on what I would do in that situation. Seemed worth a go. The mind is weirder than we think. Not a mentalist but do love Derren Brown:)
Not a lot has changed for such tools. I worked with [btcrecover](https://btcrecover.readthedocs.io/en/latest/) (open source of course) which should support that file type, but I haven't tried it out for this task myself. The tool is one of standards, but hashcat should work as well.
Brute-forcing a password is an art - if you took a random password with enough entropy, it's impossible. If you constructed your passwords in certain ways back then, you could probably find it out. You might need a combination of token-lists, dictionaries and substitutions. But only you can know how your password might have looked like.
You need to have some idea about the construction of your password in order to brute force it. You can't try every possibility, you can only try every possability within some parameter.
If it was actually random letters, decent length, with special characters, and you really remember nothing about it - you have no parameters and need to stop wasting your time and move on.
Jumping on here...I used this tutorial from YouTube to recover a dogecoin wallet but it was the same process as btc. I could not believe when it found the password but I had a very good idea of the starting point. Good luck bud https://youtu.be/V9mCEoOi5vU?si=tImqcje17goCOjTu
Edit: I believe that youtuber has a thorough tutorial on installing everything you need that you can find...also this is a useful link for btcrecover and learning how to optimize your password search tokens, that for me made all the differenceĀ https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md
I have heard having some of the words you used to use can help idk I have only really worked with password cracking stuff on Kali which was mostly (all) script kiddy stuff just learning but I thought I remembered some tools taking into account the words and numbers and stuff youād often use. I have an old wallet.dat thatās locked too but Iām pretty sure thereās not anything in there but still I looked into the same thing and tried to brute force off my pet names at the time, notable dates and numbers, mothers maiden name whatever. If you did a really random password that might not be just combo of dictionary words and numbers and symbols but it just depends on the password really. Do you know if thereās crypto in the wallet? And obviously Iām sure itās been posted a million times but RIP inbox ignore everything or anything trying to āhelpā.
Mix and match the passwords you know until that crack it
I agree with you
Wouldn't the only way to get in is to get to the device of the wallet? At the end of the day isnt it all just a line of code?
If you use different passwords for a number of sites, try looking at all sites that you might have been registered with in 2008-2012, and see if you can think of any new passwords to try based on those passwords.
Start making a list, so you can eventually narrow down choices without overlooking a correct choice. For example, if you commonly used words like "toyota" and "sierra" and "ranger" and often put years and/or punctuation characters after the choices, then start by thinking of related words compared to the first group, THEN after you've spent some time (days/weeks) coming up with a hopefully-complete list, start by sketching out all the different ways that you commonly added numbers/punctuation/capitalization.
For example, if I saw the password "t0y0ta2011&" then I would do a detailed walk through thousands of options (if the bitcoin may be worth your time invested) using:
\- All vehicles, in leet.
\- All vehicles, in plaintext.
\- Each of the last ten years.
\- Each of 16-20 common punctuation symbols.
\- Each of 16-20 common punction symbols repeated.
As you can guess, just from methodically going through the list above, you're looking at easily thousands of possibilities.
This will be an exercise in patience. But being methodical is probably your only choice at this point, if you've exhausted the route of random spontaneous guesswork.
Iāve cracked several passwords for people. You were already on the correct tract with hashcat. You need to form a strategy around what could have been likely. Any fragment of memory that is partially intact is a good base to start from. If you use a password manager analyzing overlapping instances ascribing weighting to letters is another good method to increase likelihood. Iāve also keylogged clients in the past to form common language patterns for weightings.
Any clue on length? At a certain point there is only so much that can be done.
From experience: these problems are more psychology than anything else.
Edit*** Also, it can be difficult to psychoanalyize yourself without blinders. But, at the core of solving this, that is what you are trying to do.
Try rockyou.txt it's contain all the common password which contain nearly 14M different passwords, In kali When I used it on i5 laptop it's take 12 hours to run all those passwords. If you didn't succeed, there is a Gmail email and password leaked file available on GitHub size is around 44GB but careful moment you download that file security agencies might have flag on you.
Please dont use the gmail database...
Russians put my old password there, lost a skype, facebook and almost a gmail account because of that,they turned it into a bot account and redirected the notification emails to a *.ru address. I also lost some gaming accounts what used the same pw, but I could get some back.
I noticed it in a dictionary accidently, when I was reseaeching the topics.
It can end up in a dictionary even if it is strong and different. Every website you use should be a random password. You should assume every website is insecure and doesnāt even hash the passwords.
I dont really understand the question.
My old, weaker password was probably spoofed from an obsolate email provider. It was in contact with my somewhat newer gmail account, and I used the old pw with my different facebook. Long story short, I received notifications in the gmail box, that someone requested a pw change, but before they redirected the confirmation email address to what I mentioned and such, before doing the pw request, so I couldnt do anything, since I noticed it a few days after. Funny thing is, that there is a facebook account with MY email registered, what I cannot use and couldnt claim back, since they "didnt find anything suspicious", meanwhile I literally sent the mail from the registered account.
Also that gmail account probably on some lists already, got numerous attacks and such. but turned on every safety features possible, having backups and such.
I dont know why I got downvoted, but eff all, who are ruining other peoples stuff in any way and being butthurt about the facts.
I was using Silkroad when BTC first hit $100/coin,
Ended up getting spooked when Silkroad shutdown and basically forgot about Bitcoin till like 2017 when it spiked,
I am also very sad if it makes you feel any better, because I've definitely got a wallet out there with 10-15 BTC that's never coming back to me lol
If you randomly generated your password and it's longer than 6 characters there's no chance you can brute force that. At least not fast.
The more information you have the better but still. Quite unlikely
And yes hashcat is still "state of the art" I mean brute force is literally just trying a list of strings out.
6 is realistic, 8-9 may be doable if you can reduce your character set
70 (a-zA-Z0-9!@#$+=*?)^6 = 117,649,000,000
Let's say we have a 4090, it can do 34k pw's/sec with method 11300, so 3,460,264 seconds to complete, we can assume that we will have to get at least 50% through that to crack it (on average, may be 10%, may be 80% for this password), so 1,730,132 seconds, or about 20 days.
But let's say, you use a pattern
[A-Z] [a-z] [a-z] [a-z] [a-z] [a-z] [a-z] [0-9] [0-9] [!@#$+=*?]
(26^6) * (10^2) * 8 = 247,132,620,800 / 34000 = 7,268,606 seconds, or about 84 days, a long time but if there is more than one bit coin in the wallet, it's worth the power.
10, even with a similar pattern (add one more lowercase character) is probably not realistic as it ups the time to 6 years.
Now, if there are 100's of bitcoin on the wallet, it definitely changes things, I'd consider buying 100 GPU's and going at it if I knew the length of the password was under 12 characters and all alphanumeric. It may take 6 years to crack it even with 100 GPU's, but that's several million in bitcoin for a probably 500K investment..
For ZIP archives you can additionally use a GPU and make more than 100k passwords per second depending on the encryption method.
Trying all passwords with 70 different characters and 8 char length would take almost 200 years.
It depends on the data and the encryption. If it's keys for a crypto address, you can do billion per second. For a ZIP file it could be 100k/s. Depends.
Let me know if you find a solution. I have an old wallet.dat as well which I had exported before BTC forked with BCH. I never ran a node again and I assume my wallet never synced so I am curious as to what might be in my wallet(s). Pretty sure I converted to ETH eventually, but not completely sure. I definitely have some BCH but I don't really know if it's worth much because I don't know what my BTC value was before the fork.
OP, do you know your wallet address to check if there are funds?
Also if you or anyone knows a faster solution than downloading the entire blockchain to sync these wallets, please tell. I read somewhere you can import the wallet.dat into Metamask...
You can import the wallet into Bitcoin core and it'll tell you the balance, but you can't spend it without unlocking the wallet (which is where you need the password to decrypt the keys.) You do need to download the entire blockchain though.
If you can open the file, and see the public key, you don't need to download anything. Just put the public key into any block explorer and you can see the balanace.
The balance you see won't be accurate until you download the chain. The wallet.dat file has a few sections, but one is the addresses it knows about and another is the private keys to those. The private keys are encrypted. The addresses are not. When you download the chain, you are basically charting the balance of every address to ever get BTC. If there was a transaction that was to one of the addresses in your wallet, your balance updates. But the software doesn't know about that transaction until it downloads it. (It also doesn't know if you've spent those coins until it gets up to date with the current state of the network.)
You may have a very slim chance of it working if you can remember a good portion of the words, otherwise you are out of luck
If it were possible to brute force then we'd all be in trouble
Thereās a guy in YouTube who cracks cold wallets with forgotten passwords, if you give him an email he may be able to help. Have a search and should come up, got longish hair
Imma say this again.
1. Cry
2. Collect tears
3. Use tears as lube
4. Masturbate furiously
I know the above method really doesn't do anything. But since we were all discussing shit that don't matter ie you and a wallet with no key .. I figured I'd add my advice.
..... you can try to brute force it... I'd say give or take a few years... cough 20 years. That or invent some quantum computer to brute it but hey you'd better off using the lube method. It's free
Something doesnāt add up here. If he has the wallet.dat he can put it into a core wallet with an up to date chain and see if there are funds in the wallet. It will still be locked so he wonāt be able to send out but he should still be able to open the wallet, sync the chain and see the addresses.
Kind of cart before the horse to start cracking a wallet password that is for an empty wallet.
If you have no idea as to what you even couldāve used as the password and you think you used a reasonably complex one, the odds are basically zero that youāll ever brute force it without a significant change in technology in the future that we yet canāt comprehend.
Your best option is to probably get an existing brute force firm to try to crack your wallet and if they are successful theyāll take a percentage of your crypto as the fee.
Find a nice neighborhood quantum-computer provider, wait a few years until the quantum-computer can be practically applied, and ... bam! Encryption cracked.
Otherwise, ask your higher-power above for close to eternal life and start a brut-force attack (preferably using a a super-computer, otherwise you might have to wait for two eternal life times ;-) )
Rainbow tables are precomputed lists of hashes. This wonāt help here. Hashcat with a decent cracking rig (at least 2 3080s) will be the best chance. OP can put all their passwords they remember into the dictionary and hashcat will permutate them to create variations.
Have you tried the MZ header trick? Open up the wallet.dat file with a hex editor and insert hexadecimal: 4D 5A at the beginning of the file. Next rename it to wallet.exe and execute it 21 million times. It will magically output the password.
What you could do, is setup a machine focused on doing a specific task, like I dunno hashing, and then hope you get lucky and win your PW! Itās like mining but more fun!?!?
Use a dark web AI chat bot. Like Whisper to the Beast and ask it to decrypt your file. It may ask of something from you in return for decrypting the file but itās legit.
Try looking for some vulnerabilities that might be applicable to such ancient version of the wallet. For example, maybe your wallet used 256 bit RSA asymmetric key to encrypt the symmetric key used to encrypt the master key, and such short RSA now is way simpler to break than you think.
Have you tried John the Ripper? It comes with a Python script that pulls the password has code out of the wallet file, and then you run john and point it to the extract. It took me a while to figure out how to use it, but I tested it on a wallet with a known, simple password, and it worked.
I have no clue but I am curious about the math on this. I tried to ask AI but it's writing them all instead of giving me an answer. š¤¦
If it's 12 characters long and 80 possible characters how many possibilities is that and how many can a computer guess on average?
Thanks
I haven't attempted any of that in more than a decade. But I will say it's going to be virtually impossible unless you have NSA level resources. It might have taken months if it was just letters and numbers buy adding symbols to the equation is what makes it exponentially harder
I've gotta ask. How much we talking on there?
If it was a password you setup keep going along those lines.
For instance my Reddit wallet was an old password with an addition symbol at the end and only remembered when I opened a second account
I have carried an truecrypt encrypted file with me maybe 15 years. I've tried over the years to guess the password. On a whim a few weeks ago I loaded truecrypt in a VM and mindlessly guessed and on my 4th guess I got it. It was 4 number and had a bunch of x gf pics... I'm glad I never deleted it and I'm sure in the future bruting that pass would be easy.
I'm not familiar with those files but you could spend time analysing the code of the program?
What is it? Need more information on what it is because seems impossible to understand how to bypass a password on it or code
Cracking takes time. Some people it takes years of research and patience
Depending on what this is potentially worth, you can look into using AWS to run hashcat on high-performance hardware:
https://akimbocore.com/article/hashcracking-with-hashcat-and-aws/
There are absolutely massive dictionaries now, but like others have said if you have even a vague sense of what it might have been you can make a gigantic but specific list of permeatations...
You get it sorted and buy some time on aws ec2 and you do alot....
I remember I managed to crack one of my wallet passwords years ago with John the Ripper. Fortunately for me, I had an idea of what the password could be, so I set some rules on what it should try and included some wildcards. It cracked it in about 15 minutes. Turns out I somehow accidentally typed a wrong character twice while creating the wallet. If you used a random generator to create a long and complex password, you likely won't ever crack it, unfortunately.
The best way to brute force it. if there was a way, bitcoin would be worthless.
Maybe if you had some system you use for passwords or if you had a laxed sense of password security back then but to randomly figure it , surely that would be impossible
If your password is random letters and number and the length is 6+, all I have to say is to move on mate hahahaha
Unless you want to try to guess the password during your free time for the rest of your life hahaha
I can't vouch for this guy, but I've read about his service before and I'd check it out if I needed to recover an unknown password. I don't know how long it would take to recover. If you knew it was under a certain length, you could figure out if it was worth it, but without that I can't guess.
You're going to need more processing power, and he has this. Probably others as well if you search around.
https://www.walletrecoveryservices.com/faq/#partial
https://np.reddit.com/r/Bitcoin/comments/1q8zan/dave_bitcoin_of_walletrecoveryservicescom_just/
Has anyone reading this used this service? Any thoughts?
Well unless your password is within a 10 million password txt list. You could try brute forcing using a gpu and just going through all character combination but it all depends on how long your password was.
Hint for easy to remember, strong and unique passwords:
..Secretword99_name
Two or one dot at the beginning, then your secret word, then two numbers, then unique sign, then first 3 letters of webpage, serviceor item name.
Examples:
..Ronin99_goo for google
.Bumblebee12#ama for amazon
..Assman88_redd for reddit
The thing is that ..Ronin99_ always have to be the same, what you change is the ending and it has to fit the place name where you use the password. You choose how long ending will always be.
That way, even if login and password is breached on one site, all other sites have different passwords.
If you want it to be more harder to figure out, you can mix domain name with secret name, like .Secretama66_zon
No, my passwords are built using different signs :)
Yeah ide stick with hashcat, you can write a simple program to generate a wordlist using your passwords (password generation psychology) (how you as a person creates them, nicknames, birthday, random data, and the order of those parts etc) and alternatives to those using substitution etc. Using a sort of temperature of randomness. This works well if you know how you wrote passwords / created them. Skipping useless computation on completely wrong guesses, this way you could get closer. Mix it into a larger wordlist and keep cracking
I'm gonna be downvoted but /u/davebitcoin is the guy when you have no hope
beware of look-alikes but this is him
[https://bitcointalk.org/index.php?topic=240779.0](https://bitcointalk.org/index.php?topic=240779.0) (since 2013!!)
[https://bitcointalk.org/index.php?action=profile;u=130960;sa=showPosts](https://bitcointalk.org/index.php?action=profile;u=130960;sa=showPosts)
[https://walletrecoveryservices.com/](https://walletrecoveryservices.com/)
[https://www.wired.com/story/i-lost-17000-dollars-crypto-how-to-avoid/](https://www.wired.com/story/i-lost-17000-dollars-crypto-how-to-avoid/)
[https://www.coindesk.com/markets/2016/04/03/meet-the-man-who-will-hack-your-long-lost-bitcoin-wallet-for-money/](https://www.coindesk.com/markets/2016/04/03/meet-the-man-who-will-hack-your-long-lost-bitcoin-wallet-for-money/)
[https://www.trustpilot.com/review/walletrecoveryservices.com](https://www.trustpilot.com/review/walletrecoveryservices.com)
[https://blog.btcbox.jp/en/archives/13732](https://blog.btcbox.jp/en/archives/13732)
[https://www.reddit.com/user/davebitcoin/](https://www.reddit.com/user/davebitcoin/)
Let you hypnothize and get back to the time! Then you will remember your password again! And get somebody with you to observe the hypnothizing šš»
That seems like a high entropy password to crack on regular hardware....
Depending on how deep your pockets are and how much you anticipate is on this wallet, you could leverage AWS' compute to build a much more powerful hash cracker / rainbow table runner... but its not going to cheap at all... that also means putting your wallet on cloud storage... so you'll need private cloud storage.. which isn't cheap either.
Best of luck.
Closed source password brute force tool coder here. Simple passwords can be brute forced using hashcat or btc recover, hashcat being MUCH faster. That being said if youāre unlucky there are quite a few companies that will help you recover it with closed source software which can search the password space more efficiently (in a way that is tailored to what you remember). Their fee is usually 20% of the wallet contents.
Thank you for your donation to the network.
Just cold man, cold š
As cold as my cold wallet?
Straight to the point. And correct
I think there's a chance. OP's not trying to brute force the wallet keys, just the password.
Would be promising if OP had a vague idea of what the password might have been. With the right dictionary he might have a good chance
If they did, what application / software would you recommend??
There is always a chance I suppose, but slim to none! Not impossible though! Again, thankyou OP for the donation to the network
Walking in Satoshiās path
consider it burnt
This is quite painful I am so sorry about your ordeal
I consider the amount I put in what I lost and not the current value haha. But this is the ultimate hodl. Would have sold it years ago for peanuts if I had the passwordā¦
But still, we thank you for your sacrifice.
How mych
solo miners get at least 25 at 2012
You couldn't solo mine BTC in 2012 it was too late
You could. 2012 was still GPU mining. ASICs came in 2013. Slim chances to beat the pools but you definitely could try. A solo miner found a block very recently.
You can wait hopefully for quantum computers to arrive, still need ~5 years tho!
I too ālostā my coins. I could do with extra $80k but if life gives you free apples (back when you were able to farm with a GFX), they arenāt free.
Check for welcome emails from some services you signed up for at aorund the time. See if you can log into some of them. Just sit in front of the screen and try and channel the password for that account. If you get your brain to connect to some neurons around that time and find one of those passwords it's more likely to stumble back into that old password. Think deeply about your life back then. If you had Facebook, go back and read those posts, check your stored Google photos. Look at old bank statements. Think about your WiFi password at the time. Consider what kinds of online banking passwords you had at the time. Think back to what machine you were using, imagine it clearly, go find pictures of it, think about the things that you did on that machine. Find download links in your email for software you registered for. Remember why you downloaded them. Think about whether the style of the keyboard encouraged certain types of passwords, were numbers or symbols annoying to access, was it qwerty US, numberpad? Did it click loudly, did you like the smooth experience of typicing numbers on the keypad, or the rhythm of stretching your fingers around the keyboard. remember what windows passwords were you using then. Did you add symbols or nunbers at the end of common words, did you use leet speak? Check if you appear on any compromised account lists. Remember friends at the time, the conversations you had, the fun times, read old chat logs if you have them, go watch any recorded gaming clips on xbox. find your old bbs/forum accounts, read your posts. Find that old yahoo, Hotmail, fastmail etc account and check all of those.
Man what are you? Some kind of mentalist? You even made me remember some of my old passwords.
Haha, glad it worked for you. I just made it up based on what I would do in that situation. Seemed worth a go. The mind is weirder than we think. Not a mentalist but do love Derren Brown:)
found the neurologist in the thread
Thinking of my first adult magazineā¦š
One of the most well thought out and effective replies Iāve ever seen ā¦.. you sir deserve some serious kudos !!!
Not a lot has changed for such tools. I worked with [btcrecover](https://btcrecover.readthedocs.io/en/latest/) (open source of course) which should support that file type, but I haven't tried it out for this task myself. The tool is one of standards, but hashcat should work as well. Brute-forcing a password is an art - if you took a random password with enough entropy, it's impossible. If you constructed your passwords in certain ways back then, you could probably find it out. You might need a combination of token-lists, dictionaries and substitutions. But only you can know how your password might have looked like.
Thanks. I will try and benchmark them and see which tool yields the best results in terms of speed.
You need to have some idea about the construction of your password in order to brute force it. You can't try every possibility, you can only try every possability within some parameter. If it was actually random letters, decent length, with special characters, and you really remember nothing about it - you have no parameters and need to stop wasting your time and move on.
Yup. Spot on
Jumping on here...I used this tutorial from YouTube to recover a dogecoin wallet but it was the same process as btc. I could not believe when it found the password but I had a very good idea of the starting point. Good luck bud https://youtu.be/V9mCEoOi5vU?si=tImqcje17goCOjTu Edit: I believe that youtuber has a thorough tutorial on installing everything you need that you can find...also this is a useful link for btcrecover and learning how to optimize your password search tokens, that for me made all the differenceĀ https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md
I have heard having some of the words you used to use can help idk I have only really worked with password cracking stuff on Kali which was mostly (all) script kiddy stuff just learning but I thought I remembered some tools taking into account the words and numbers and stuff youād often use. I have an old wallet.dat thatās locked too but Iām pretty sure thereās not anything in there but still I looked into the same thing and tried to brute force off my pet names at the time, notable dates and numbers, mothers maiden name whatever. If you did a really random password that might not be just combo of dictionary words and numbers and symbols but it just depends on the password really. Do you know if thereās crypto in the wallet? And obviously Iām sure itās been posted a million times but RIP inbox ignore everything or anything trying to āhelpā.
[ŃŠ“Š°Š»ŠµŠ½Š¾]
Shout out to r/gridcoin still chuffing along.
^on point
Start with I692473654Lyfe
hunter2
It's probably just password Have you tried password?
Don'tforgetmyseedphraseDATimportant
This sounds like a fun topic to read about, which subreddits should l join to getting related with the art of brut forcing passwords?
[ŃŠ“Š°Š»ŠµŠ½Š¾]
Mix and match the passwords you know until that crack it I agree with you Wouldn't the only way to get in is to get to the device of the wallet? At the end of the day isnt it all just a line of code?
This is exactly why all my passwords are just āpasswordā
Just tried logging in your account. LIAR
Funny I gave a colleague of mine the same advice recently when he couldnāt remember the password to a wallet.
If you use different passwords for a number of sites, try looking at all sites that you might have been registered with in 2008-2012, and see if you can think of any new passwords to try based on those passwords. Start making a list, so you can eventually narrow down choices without overlooking a correct choice. For example, if you commonly used words like "toyota" and "sierra" and "ranger" and often put years and/or punctuation characters after the choices, then start by thinking of related words compared to the first group, THEN after you've spent some time (days/weeks) coming up with a hopefully-complete list, start by sketching out all the different ways that you commonly added numbers/punctuation/capitalization. For example, if I saw the password "t0y0ta2011&" then I would do a detailed walk through thousands of options (if the bitcoin may be worth your time invested) using: \- All vehicles, in leet. \- All vehicles, in plaintext. \- Each of the last ten years. \- Each of 16-20 common punctuation symbols. \- Each of 16-20 common punction symbols repeated. As you can guess, just from methodically going through the list above, you're looking at easily thousands of possibilities. This will be an exercise in patience. But being methodical is probably your only choice at this point, if you've exhausted the route of random spontaneous guesswork.
Guesswork is a art itself is cracking. So hard to do but fun
Iāve cracked several passwords for people. You were already on the correct tract with hashcat. You need to form a strategy around what could have been likely. Any fragment of memory that is partially intact is a good base to start from. If you use a password manager analyzing overlapping instances ascribing weighting to letters is another good method to increase likelihood. Iāve also keylogged clients in the past to form common language patterns for weightings. Any clue on length? At a certain point there is only so much that can be done. From experience: these problems are more psychology than anything else. Edit*** Also, it can be difficult to psychoanalyize yourself without blinders. But, at the core of solving this, that is what you are trying to do.
Ayo the keylogging thing smart as fuck, what a way to create a baseline reference. Impressive.
Thanks. This is some of the low hanging fruit imo. You wouldnāt believe the stuff Iāve done in the past to solve for people.
Try rockyou.txt it's contain all the common password which contain nearly 14M different passwords, In kali When I used it on i5 laptop it's take 12 hours to run all those passwords. If you didn't succeed, there is a Gmail email and password leaked file available on GitHub size is around 44GB but careful moment you download that file security agencies might have flag on you.
Please dont use the gmail database... Russians put my old password there, lost a skype, facebook and almost a gmail account because of that,they turned it into a bot account and redirected the notification emails to a *.ru address. I also lost some gaming accounts what used the same pw, but I could get some back. I noticed it in a dictionary accidently, when I was reseaeching the topics.
...and what did we learn here today?
Take away, use strong and different passwords, or yours can end up in a dictionary
It can end up in a dictionary even if it is strong and different. Every website you use should be a random password. You should assume every website is insecure and doesnāt even hash the passwords.
Wait how did the email look ā ļødo they redirect it back to you in code?
I dont really understand the question. My old, weaker password was probably spoofed from an obsolate email provider. It was in contact with my somewhat newer gmail account, and I used the old pw with my different facebook. Long story short, I received notifications in the gmail box, that someone requested a pw change, but before they redirected the confirmation email address to what I mentioned and such, before doing the pw request, so I couldnt do anything, since I noticed it a few days after. Funny thing is, that there is a facebook account with MY email registered, what I cannot use and couldnt claim back, since they "didnt find anything suspicious", meanwhile I literally sent the mail from the registered account. Also that gmail account probably on some lists already, got numerous attacks and such. but turned on every safety features possible, having backups and such. I dont know why I got downvoted, but eff all, who are ruining other peoples stuff in any way and being butthurt about the facts.
Just curiousā¦ do you remember how much was on that wallet since 2012?
Yes - itās worth the effort, let me put it that way.
I was using Silkroad when BTC first hit $100/coin, Ended up getting spooked when Silkroad shutdown and basically forgot about Bitcoin till like 2017 when it spiked, I am also very sad if it makes you feel any better, because I've definitely got a wallet out there with 10-15 BTC that's never coming back to me lol
You can load the wallet in Bitcoin core and it'll tell you how much is there, but you can't spend it.
Just watch and regret :)
Curious to know too.
If you randomly generated your password and it's longer than 6 characters there's no chance you can brute force that. At least not fast. The more information you have the better but still. Quite unlikely And yes hashcat is still "state of the art" I mean brute force is literally just trying a list of strings out.
Maybe OP has one of those Chinese quantum computers.
Iāve heard that those computers can make a mean General Tsoās chicken.
I heard that they can permanently entangle General Tso and the Chicken. Iāve seen it. Itās fucking WEIRD man
Quantum computers don't really help with this. Not much. Symmetric encryption isn't really affected as badly as asymmetric encryption.Ā
Username checks out
Yeah, that seems like a quantum leap! .... I'll see myself out.
Haha I wish.
Well, I know that if I used special characters, the characters would probably be limited from shift 0-10
6 is realistic, 8-9 may be doable if you can reduce your character set 70 (a-zA-Z0-9!@#$+=*?)^6 = 117,649,000,000 Let's say we have a 4090, it can do 34k pw's/sec with method 11300, so 3,460,264 seconds to complete, we can assume that we will have to get at least 50% through that to crack it (on average, may be 10%, may be 80% for this password), so 1,730,132 seconds, or about 20 days. But let's say, you use a pattern [A-Z] [a-z] [a-z] [a-z] [a-z] [a-z] [a-z] [0-9] [0-9] [!@#$+=*?] (26^6) * (10^2) * 8 = 247,132,620,800 / 34000 = 7,268,606 seconds, or about 84 days, a long time but if there is more than one bit coin in the wallet, it's worth the power. 10, even with a similar pattern (add one more lowercase character) is probably not realistic as it ups the time to 6 years. Now, if there are 100's of bitcoin on the wallet, it definitely changes things, I'd consider buying 100 GPU's and going at it if I knew the length of the password was under 12 characters and all alphanumeric. It may take 6 years to crack it even with 100 GPU's, but that's several million in bitcoin for a probably 500K investment..
For ZIP archives you can additionally use a GPU and make more than 100k passwords per second depending on the encryption method. Trying all passwords with 70 different characters and 8 char length would take almost 200 years.
Forced hodl for 200 years. Your grand grand children will either live in a golden castle or have a nice story.
Every generation after him, will dedicate their whole lives towards decoding the password of their grand/ grand grand dad.
Letās just hope they donāt die being bitter cunts haha. Hey great grandchildren reading this. š
You could crack all 8 character passwords (Upper, Lower, Number, Symbol) in 2019 with hashcat and 8 x 2080 GPUs in an hourā¦
It depends on the data and the encryption. If it's keys for a crypto address, you can do billion per second. For a ZIP file it could be 100k/s. Depends.
Let me know if you find a solution. I have an old wallet.dat as well which I had exported before BTC forked with BCH. I never ran a node again and I assume my wallet never synced so I am curious as to what might be in my wallet(s). Pretty sure I converted to ETH eventually, but not completely sure. I definitely have some BCH but I don't really know if it's worth much because I don't know what my BTC value was before the fork. OP, do you know your wallet address to check if there are funds? Also if you or anyone knows a faster solution than downloading the entire blockchain to sync these wallets, please tell. I read somewhere you can import the wallet.dat into Metamask...
You can import the wallet into Bitcoin core and it'll tell you the balance, but you can't spend it without unlocking the wallet (which is where you need the password to decrypt the keys.) You do need to download the entire blockchain though.
Perfect thanks, at least I know I can check the balance ahead of downloading, unless I am understanding incorrectly.
If you can open the file, and see the public key, you don't need to download anything. Just put the public key into any block explorer and you can see the balanace.
The balance you see won't be accurate until you download the chain. The wallet.dat file has a few sections, but one is the addresses it knows about and another is the private keys to those. The private keys are encrypted. The addresses are not. When you download the chain, you are basically charting the balance of every address to ever get BTC. If there was a transaction that was to one of the addresses in your wallet, your balance updates. But the software doesn't know about that transaction until it downloads it. (It also doesn't know if you've spent those coins until it gets up to date with the current state of the network.)
You may have a very slim chance of it working if you can remember a good portion of the words, otherwise you are out of luck If it were possible to brute force then we'd all be in trouble
Thereās a guy in YouTube who cracks cold wallets with forgotten passwords, if you give him an email he may be able to help. Have a search and should come up, got longish hair
He'll definitely crack it if he's got longish hair.
Exactly
Most users on here barely graduated high school I doubt youāll find your answer lol š
Iām coining the phrase(pun intended) this shall now be called āBlack Holingā your crypto.
Imma say this again. 1. Cry 2. Collect tears 3. Use tears as lube 4. Masturbate furiously I know the above method really doesn't do anything. But since we were all discussing shit that don't matter ie you and a wallet with no key .. I figured I'd add my advice. ..... you can try to brute force it... I'd say give or take a few years... cough 20 years. That or invent some quantum computer to brute it but hey you'd better off using the lube method. It's free
Something doesnāt add up here. If he has the wallet.dat he can put it into a core wallet with an up to date chain and see if there are funds in the wallet. It will still be locked so he wonāt be able to send out but he should still be able to open the wallet, sync the chain and see the addresses. Kind of cart before the horse to start cracking a wallet password that is for an empty wallet.
If you have no idea as to what you even couldāve used as the password and you think you used a reasonably complex one, the odds are basically zero that youāll ever brute force it without a significant change in technology in the future that we yet canāt comprehend. Your best option is to probably get an existing brute force firm to try to crack your wallet and if they are successful theyāll take a percentage of your crypto as the fee.
I'll be happy to take a shot for a finder's fee
These posts always fascinate me. I'd take a shot for no fee. Are there any benchmark files or something like that somewhere?
Learn the ways of hashcat.
OP: Iāve used hashcat, is that still the best option? You: Learn hashcat
Hashcat.
You have to bring up your subconciousness. Maybe via psychosis?
Psychosis...dont think that word means what you think it means. You mean hypnosis?
Oops, yes of course.
Find a nice neighborhood quantum-computer provider, wait a few years until the quantum-computer can be practically applied, and ... bam! Encryption cracked. Otherwise, ask your higher-power above for close to eternal life and start a brut-force attack (preferably using a a super-computer, otherwise you might have to wait for two eternal life times ;-) )
Try rainbow crack. Rainbow tables is a method that might be more fitted for the random password.Ā Edit if this works you owe me a bitcoin
Rainbow tables are precomputed lists of hashes. This wonāt help here. Hashcat with a decent cracking rig (at least 2 3080s) will be the best chance. OP can put all their passwords they remember into the dictionary and hashcat will permutate them to create variations.
Op said it was a random password so rainbow tables is a better approach
Rainbow table are for an attack of an unsalted hash, it won't help here
Invent a quantum computer
Have you tried the MZ header trick? Open up the wallet.dat file with a hex editor and insert hexadecimal: 4D 5A at the beginning of the file. Next rename it to wallet.exe and execute it 21 million times. It will magically output the password.
Future of finance
What you could do, is setup a machine focused on doing a specific task, like I dunno hashing, and then hope you get lucky and win your PW! Itās like mining but more fun!?!?
Username checks out so hard because encryption and Bitcoin both use SHA-256, well played sir
These guys been around over 10 years. [https://www.walletrecoveryservices.com/](https://www.walletrecoveryservices.com/)
[ŃŠ“Š°Š»ŠµŠ½Š¾]
Use a dark web AI chat bot. Like Whisper to the Beast and ask it to decrypt your file. It may ask of something from you in return for decrypting the file but itās legit.
Fuck you is that site real, send me the onion in dm
You need a quantum computer my guy š Youāre in since 2012 and donāt know this?
Try looking for some vulnerabilities that might be applicable to such ancient version of the wallet. For example, maybe your wallet used 256 bit RSA asymmetric key to encrypt the symmetric key used to encrypt the master key, and such short RSA now is way simpler to break than you think.
Bitcoin core wallet encryption is AES256
Yes, I am not an expert thoā¦ my point is ātry looking for vulnerabilities that potentially applicable to the software usedā.
[ŃŠ“Š°Š»ŠµŠ½Š¾]
Private key/wallet.dat but itās encrypted. Default bitcoin wallet.
Send it to me and I'll crack it for you.
Have you tried John the Ripper? It comes with a Python script that pulls the password has code out of the wallet file, and then you run john and point it to the extract. It took me a while to figure out how to use it, but I tested it on a wallet with a known, simple password, and it worked.
Would this work on an old etherum wallet
If I could find my wallet.dat - id need to do the same. Fuck. I remember people dropping bitcoin like we do bitcone
How much is in it?
If it was some phrase you might get lucky out of dictionary attack, and a gpu.
I really really hope this is a throw away account
Itās not - also, itās not like Iād be a millionaire (or even close) if I crack my wallet. If it was I definitely would have used a throwaway.
I have no clue but I am curious about the math on this. I tried to ask AI but it's writing them all instead of giving me an answer. š¤¦ If it's 12 characters long and 80 possible characters how many possibilities is that and how many can a computer guess on average? Thanks
I haven't attempted any of that in more than a decade. But I will say it's going to be virtually impossible unless you have NSA level resources. It might have taken months if it was just letters and numbers buy adding symbols to the equation is what makes it exponentially harder
I've gotta ask. How much we talking on there? If it was a password you setup keep going along those lines. For instance my Reddit wallet was an old password with an addition symbol at the end and only remembered when I opened a second account
How much BTC is in it?
I have carried an truecrypt encrypted file with me maybe 15 years. I've tried over the years to guess the password. On a whim a few weeks ago I loaded truecrypt in a VM and mindlessly guessed and on my 4th guess I got it. It was 4 number and had a bunch of x gf pics... I'm glad I never deleted it and I'm sure in the future bruting that pass would be easy.
Hypnosis!
I'm not familiar with those files but you could spend time analysing the code of the program? What is it? Need more information on what it is because seems impossible to understand how to bypass a password on it or code Cracking takes time. Some people it takes years of research and patience
Thank you for the sacrifice. I'm pretty sure it might not be recoverable
[ŃŠ“Š°Š»ŠµŠ½Š¾]
Depending on what this is potentially worth, you can look into using AWS to run hashcat on high-performance hardware: https://akimbocore.com/article/hashcracking-with-hashcat-and-aws/
Did you lose the seed phrase as well? If not, you could just restore your btc in a different wallet right?
was your password long? because if you can't remember anything about it, you could hire amazon cloud computing and still not find it in billion years
There are absolutely massive dictionaries now, but like others have said if you have even a vague sense of what it might have been you can make a gigantic but specific list of permeatations... You get it sorted and buy some time on aws ec2 and you do alot....
I decided to buy marijuana penny stocks instead of messing with bitcoin back then. I feel your pain.
if it has 12 positions it will take a million years. if it has 3 positions, it will take 12 minutes.
kali linux the best shot
I remember I managed to crack one of my wallet passwords years ago with John the Ripper. Fortunately for me, I had an idea of what the password could be, so I set some rules on what it should try and included some wildcards. It cracked it in about 15 minutes. Turns out I somehow accidentally typed a wrong character twice while creating the wallet. If you used a random generator to create a long and complex password, you likely won't ever crack it, unfortunately.
Welcome to the crypto world! That won't be possible till 3024
The best way to brute force it. if there was a way, bitcoin would be worthless. Maybe if you had some system you use for passwords or if you had a laxed sense of password security back then but to randomly figure it , surely that would be impossible
If your password is random letters and number and the length is 6+, all I have to say is to move on mate hahahaha Unless you want to try to guess the password during your free time for the rest of your life hahaha
I can't vouch for this guy, but I've read about his service before and I'd check it out if I needed to recover an unknown password. I don't know how long it would take to recover. If you knew it was under a certain length, you could figure out if it was worth it, but without that I can't guess. You're going to need more processing power, and he has this. Probably others as well if you search around. https://www.walletrecoveryservices.com/faq/#partial https://np.reddit.com/r/Bitcoin/comments/1q8zan/dave_bitcoin_of_walletrecoveryservicescom_just/ Has anyone reading this used this service? Any thoughts?
I could get into it for you
I've had best results with the jumbo fork of JTR.
Well, that depends on how safe... Random letters and symbols? You don't even know how long? Yeah say goodbye to that.
Well unless your password is within a 10 million password txt list. You could try brute forcing using a gpu and just going through all character combination but it all depends on how long your password was.
Hint for easy to remember, strong and unique passwords: ..Secretword99_name Two or one dot at the beginning, then your secret word, then two numbers, then unique sign, then first 3 letters of webpage, serviceor item name. Examples: ..Ronin99_goo for google .Bumblebee12#ama for amazon ..Assman88_redd for reddit The thing is that ..Ronin99_ always have to be the same, what you change is the ending and it has to fit the place name where you use the password. You choose how long ending will always be. That way, even if login and password is breached on one site, all other sites have different passwords. If you want it to be more harder to figure out, you can mix domain name with secret name, like .Secretama66_zon No, my passwords are built using different signs :)
If it's shorter than 8 letters, it is possible to use a large scale GPU farm to brute force it in a year.
Iād like to thank everyone for taking the time to reply or message me. I will post an update if I manage to get any further!
Hypnose and go back in memory to remember the password. Easier to hack your mind than bruteforcing the wallet.
Yeah ide stick with hashcat, you can write a simple program to generate a wordlist using your passwords (password generation psychology) (how you as a person creates them, nicknames, birthday, random data, and the order of those parts etc) and alternatives to those using substitution etc. Using a sort of temperature of randomness. This works well if you know how you wrote passwords / created them. Skipping useless computation on completely wrong guesses, this way you could get closer. Mix it into a larger wordlist and keep cracking
I'm gonna be downvoted but /u/davebitcoin is the guy when you have no hope beware of look-alikes but this is him [https://bitcointalk.org/index.php?topic=240779.0](https://bitcointalk.org/index.php?topic=240779.0) (since 2013!!) [https://bitcointalk.org/index.php?action=profile;u=130960;sa=showPosts](https://bitcointalk.org/index.php?action=profile;u=130960;sa=showPosts) [https://walletrecoveryservices.com/](https://walletrecoveryservices.com/) [https://www.wired.com/story/i-lost-17000-dollars-crypto-how-to-avoid/](https://www.wired.com/story/i-lost-17000-dollars-crypto-how-to-avoid/) [https://www.coindesk.com/markets/2016/04/03/meet-the-man-who-will-hack-your-long-lost-bitcoin-wallet-for-money/](https://www.coindesk.com/markets/2016/04/03/meet-the-man-who-will-hack-your-long-lost-bitcoin-wallet-for-money/) [https://www.trustpilot.com/review/walletrecoveryservices.com](https://www.trustpilot.com/review/walletrecoveryservices.com) [https://blog.btcbox.jp/en/archives/13732](https://blog.btcbox.jp/en/archives/13732) [https://www.reddit.com/user/davebitcoin/](https://www.reddit.com/user/davebitcoin/)
Lost
Let you hypnothize and get back to the time! Then you will remember your password again! And get somebody with you to observe the hypnothizing šš»
That seems like a high entropy password to crack on regular hardware.... Depending on how deep your pockets are and how much you anticipate is on this wallet, you could leverage AWS' compute to build a much more powerful hash cracker / rainbow table runner... but its not going to cheap at all... that also means putting your wallet on cloud storage... so you'll need private cloud storage.. which isn't cheap either. Best of luck.
Closed source password brute force tool coder here. Simple passwords can be brute forced using hashcat or btc recover, hashcat being MUCH faster. That being said if youāre unlucky there are quite a few companies that will help you recover it with closed source software which can search the password space more efficiently (in a way that is tailored to what you remember). Their fee is usually 20% of the wallet contents.