Bitcoin Forum

Economy => Services => Topic started by: walletrecovery on March 28, 2022, 04:40:31 PM



Title: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 28, 2022, 04:40:31 PM
I think password was Words or Phrases which start With "Ca" (characters amount are unknown).
It is possible that password is in one of these dictionaries: https://weakpass.com/wordlist
Who can create a special dictionary with such words and phrases has a chance to win $10,000



Title: Topic starter
Post by: walletrecovery on March 28, 2022, 04:41:34 PM
Reserved for the winner!


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: BlackHatCoiner on March 28, 2022, 04:42:30 PM
Have you tried every single of those in weakpass?


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 28, 2022, 04:58:05 PM
Have you tried every single of those in weakpass?

No, I have not tried any of these dictionaries: https://weakpass.com/wordlist
There are a lot of extra passwords in these dictionaries that do not suit me.
I tried all these words, but they did not open my wallet (I use Hashcat).
I didn't try to check phrases. It's hard for me to make a dictionary of them.
https://worddb.com/words/starting-with/ca


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: BlackHatCoiner on March 28, 2022, 05:03:12 PM
There are a lot of extra passwords in these dictionaries that do not suit me.
You say that you only want passwords that start with "Ca" and are either words or phrases (not sure what's the difference). You don't know anything else that could reduce the effort by a lot.

So why don't you just try every wordlist with a "Ca" added in every line (all together) by you?


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: Mpamaegbu on March 28, 2022, 05:26:25 PM
Your moniker is, "walletrecovery" yet you're at a loss recovering a wallet? It's a play on words, right or should we otherwise say you're just playing around with such a request. I saw your other thread Address syntax inside the 10000 BTC wallet.dat file (https://bitcointalk.org/index.php?topic=5387376.msg59362361#msg59362361) where you also asked for help on wallet issue. How is anyone sure you're even going to make good on what you've promised here if the wallet is cracked?


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: seoincorporation on March 28, 2022, 05:28:17 PM
...
No, I have not tried any of these dictionaries: https://weakpass.com/wordlist
There are a lot of extra passwords in these dictionaries that do not suit me.
...

Make the list is simple, but since the files are huge (more than 10Gb each one) then it would take some time.

The right way to create the passwords list is:

1.-We create a folder and download all the passwords files (.txt) on that folder.

2.-We read all the files and send all the passwords that start with 'Ca' to a new file:

Code:
cat *.txt | grep '^Ca*' >> my_dic.txt

3.-Clear the repetitive passwords found in different files:

Code:
cat my_dic.txt | sort -u > final_dic.txt


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 28, 2022, 05:31:59 PM
There are a lot of extra passwords in these dictionaries that do not suit me.
You say that you only want passwords that start with "Ca" and are either words or phrases (not sure what's the difference). You don't know anything else that could reduce the effort by a lot.

So why don't you just try every wordlist with a "Ca" added in every line (all together) by you?

No, it's not just a password that starts with the first two characters "Ca", it's a password that makes sense, otherwise it would be impossible to pick up such a password. I don't remember if it was one word or some well-known phrase, and that's the problem. It is possible that the password has been stolen and is now in one of these password collections. I need a smart guy who can filter all passwords and leave only those with the first 2 characters "Ca".



...
No, I have not tried any of these dictionaries: https://weakpass.com/wordlist
There are a lot of extra passwords in these dictionaries that do not suit me.
...

Make the list is simple, but since the files are huge (more than 10Gb each one) then it would take some time.

The right way to create the passwords list is:

1.-We create a folder and download all the passwords files (.txt) on that folder.

2.-We read all the files and send all the passwords that start with 'Ca' to a new file:

Code:
cat *.txt | grep '^Ca*' >> my_dic.txt

3.-Clear the repetitive passwords found in different files:

Code:
cat my_dic.txt | sort -u > final_dic.txt

Thanks, but I don't have Linux, I have Windows only.



Your moniker is, "walletrecovery" yet you're at a loss recovering a wallet? It's a play on words, right or should we otherwise say you're just playing around with such a request. I saw your other thread Address syntax inside the 10000 BTC wallet.dat file (https://bitcointalk.org/index.php?topic=5387376.msg59362361#msg59362361) where you also asked for help on wallet issue. How is anyone sure you're even going to make good on what you've promised here if the wallet is cracked?

Yes, at that time we did not understand some details, now everything is in order. The topic you are writing about, there were some experiments and the wallet with 10000 BTC be a fake. There is a new version of the "pywallet" program, now we can determine without errors whether the wallet is fake or genuine, and we can also find out the date and time when the wallet was encrypted. At that time, someone noticed our incompetence and wrote us "-1" in the trust and it was very cruel.

[moderator's note: consecutive posts merged]


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: BlackHatCoiner on March 28, 2022, 05:47:30 PM
At that time, someone noticed our incompetence and wrote us "-1" in the trust and it was very cruel.
It wasn't just about your incompetence; you advertise yourself as a wallet recovery service, but yet you don't know the basics. You're supposedly the one who should be paid for this bounty you have called. That's suspicious.

Thanks, but I don't have Linux, I have Windows only.
Why don't you use an LTS (https://ubuntu.com/blog/tag/LTS) or a virtual machine then? If we're talking about millions of dollars worth of bitcoins I'd boot a Linux distro right now and do this professionally.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 28, 2022, 06:07:09 PM
At that time, someone noticed our incompetence and wrote us "-1" in the trust and it was very cruel.
It wasn't just about your incompetence; you advertise yourself as a wallet recovery service, but yet you don't know the basics. You're supposedly the one who should be paid for this bounty you have called. That's suspicious.

Thanks, but I don't have Linux, I have Windows only.
Why don't you use an LTS (https://ubuntu.com/blog/tag/LTS) or a virtual machine then? If we're talking about millions of dollars worth of bitcoins I'd boot a Linux distro right now and do this professionally.

There are only a couple of coins, there are no millions of dollars there.
I've never used a virtual machine and don't know how.
If someone created such a dictionary with passwords and wrote this dictionary to the cloud or torrent, I could download and check.
Also I check this surnames https://britishsurnames.co.uk/surnames/CA/


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: Mpamaegbu on March 28, 2022, 07:46:18 PM
@walletrecovery, you should stop posting in a roll for such isn't encouraged in a board like here. Learn to merge your posts to avoid incurring the wrath of the mods.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 28, 2022, 08:26:43 PM
@walletrecovery, you should stop posting in a roll for such isn't encouraged in a board like here. Learn to merge your posts to avoid incurring the wrath of the mods.

Write us instructions, why you are not satisfied and what violations of the rules we have. We will definitely fix the problem.
Right now I'm trying to find a password that might be hidden in dictionaries.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: Mpamaegbu on March 29, 2022, 04:12:09 AM
Write us instructions, why you are not satisfied and what violations of the rules we have. We will definitely fix the problem.
That's the forum rule you're breaking 👇

Forum rules (#post_rules)
32. Posting multiple posts in a row (excluding bumps and reserved posts by the thread starter) is not allowed.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 29, 2022, 09:29:57 AM
Write us instructions, why you are not satisfied and what violations of the rules we have. We will definitely fix the problem.
That's the forum rule you're breaking 👇

Forum rules (#post_rules)
32. Posting multiple posts in a row (excluding bumps and reserved posts by the thread starter) is not allowed.

Show us our mistake and we will remove the post.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: slackovic on March 29, 2022, 10:09:04 AM
Write us instructions, why you are not satisfied and what violations of the rules we have. We will definitely fix the problem.
That's the forum rule you're breaking 👇

Forum rules (#post_rules)
32. Posting multiple posts in a row (excluding bumps and reserved posts by the thread starter) is not allowed.

Show us our mistake and we will remove the post.

I think that he talks about these three posts in a row:

/snip

/snip

/snip

I removed the content so that this message stays clear. You should put those three posts in one big post. If you want, you can divide it with \[hr\] tag (just remove the backslash \ from it).


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: Lucius on March 29, 2022, 10:55:19 AM
@walletrecovery, It's a bit strange that someone who offers wallets recovery services asks for this kind of help - it's not a very good recommendation for your service ...

If you've tried it yourself and failed, maybe it's time to seek the help of a professional, and I only know one who has a good reputation -> Bitcoin Wallet Recovery Services - for forgotten wallet password (https://bitcointalk.org/index.php?topic=240779.0)


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 29, 2022, 11:18:22 AM
@walletrecovery, It's a bit strange that someone who offers wallets recovery services asks for this kind of help - it's not a very good recommendation for your service ...

If you've tried it yourself and failed, maybe it's time to seek the help of a professional, and I only know one who has a good reputation -> Bitcoin Wallet Recovery Services - for forgotten wallet password (https://bitcointalk.org/index.php?topic=240779.0)

Which means we failed. I don't have the experience to extract the passwords I need from a large dictionary.
If someone knows how to do this and the password is found, he will receive $ 10,000.
This is a great job offer. The owner of the wallet bought some coins in 2015 and lost the password.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on March 29, 2022, 11:18:57 AM
Thanks, but I don't have Linux, I have Windows only.
I'm currently downloading all Torrents on the first page of https://weakpass.com/wordlist, but before I continue: which file do you want me to get "Ca" from?


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 29, 2022, 03:41:54 PM
Thanks, but I don't have Linux, I have Windows only.
I'm currently downloading all Torrents on the first page of https://weakpass.com/wordlist, but before I continue: which file do you want me to get "Ca" from?

If there is the largest dictionary that takes more than 100 or 200 gigabytes, then there are probably many passwords inside it, in which the first 2 letters are "Ca". But at the same time, I know for sure that the password was not generated by a robot, the password was invented by a person, and we need passwords that were invented by people. We only need dictionaries that are made up of human-made passwords.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on March 29, 2022, 03:55:35 PM
We only need dictionaries that are made up of human-made passwords.
Is it on that site? Do you have a direct (torrent) link to the one you want?
I'm currently extracting anything starting with "Ca" from weakpass_3a.7z (it takes a very long time to extract). Are you sure "ca" should be excluded: only Ca?

Try this: http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu//weakpass_3a_Ca_walletrecovery.txt (219 MB, 18872862 passwords).


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 29, 2022, 08:11:48 PM
Are you sure "ca" should be excluded: only Ca?

- Yes, I'm sure. All "ca" passwords must be rename as "Ca"

Thanks!

Let start checking with your special dictionary now!

I will post here Hashcat log data results:

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*****************************************
Time.Started.....: Tue Mar 29 23:14:23 2022 (2 hours, 48 mins)
Time.Estimated...: Wed Mar 30 02:03:21 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\weakpass_3a_Ca_walletrecovery.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     1862 H/s (0.19ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 18872859/18872859 (100.00%)
Rejected.........: 0/18872859 (0.00%)
Restore.Point....: 18872859/18872859 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: CaZZy2206 -> Caя┐╜я┐╜vamos
Hardware.Mon.#1..: Temp: 41c Fan: 45% Util: 67% Core:1199MHz Mem:6794MHz Bus:16

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on March 30, 2022, 04:30:00 PM
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
Which one? How about you create a list of all the .torrent files you want me to download. My Seedbox expires in a few days, so don't wait too long as I don't want to download those huge files elsewhere.
Update: I'm currently extracting the 153 GB I've downloaded already. I'm (ab)using all CPU cores, but the Seedbox is still quite empty so I hope they won't kick me off. I'll post the links when done.

Currently extracting:
Code:
cyclone.hashesorg.hashkiller.combined.txt.7z
dicassassin.7z
dictionary_private.dic.7z
hashesorg2019.gz
Hashes.org.7z
HashesOrg.gz
hashkiller-dict.txt.7z
rockyou2021.7z
weakpass_1.gz
weakpass_2a.gz
weakpass_2.gz
weakpass_3.7z
weakpass_3p.7z
xsukax-Wordlist-All.7z

Update
See: http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/ for the files.

There's a total of 99,601,845 passwords in there. I've added allinone.txt: it doesn't include duplicates and is reduced to 41,399,595 passwords.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 30, 2022, 07:33:17 PM
Update: I'm currently extracting the 153 GB I've downloaded already. I'm (ab)using all CPU cores, but the Seedbox is still quite empty so I hope they won't kick me off. I'll post the links when done.

ThankYou! LoyceV
Doesn't "Google drive" provide space for free?
I've decided to reward you with 50 BitcoinHD (BHD) just for helping me, tell me your wallet address.
https://github.com/btchd/btchd/releases

If successful our password story, I will transfer you additionally $10,000 (USDT TRC-20)


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on March 30, 2022, 07:51:41 PM
Doesn't "Google drive" provide space for free?
I think it's 15 GB, that's no use :P

Quote
I've decided to reward you with 50 BitcoinHD (BHD) just for helping me, tell me your wallet address.
I have no idea what that is, and I don't have any use for it. I also don't install unknown software. If you can convert it to a low fee common altcoin or BTC-LN I'll accept it.

Quote
If successful our password story, I will transfer you additionally $10,000 (USDT TRC-20)
This is Bitcointalk ;)

I've updated my previous post (sorting the data took long). See allinone.txt (http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/allinone.txt), that has all data.

If you want to try more:
create a list of all the .torrent files you want me to download.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 31, 2022, 07:00:19 AM
I have no idea what that is, and I don't have any use for it. I also don't install unknown software. If you can convert it to a low fee common altcoin or BTC-LN I'll accept it.

The transfer of any coins from the exchange is very expensive, a very large commission.
I offered BitcoinHD coins or I also have Litecoin Cash (they are stored on QT wallets).
Of course, these are probably shitty coins, but I believe that they will rise in value.

Dictionary cache built:
* Filename..: f:\hashcat\wallet\allinone.txt
* Passwords.: 41399595
* Bytes.....: 524143144
* Keyspace..: 41399592
* Runtime...: 3 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*******************************************
Time.Started.....: Thu Mar 31 10:54:16 2022 (3 hours, 56 mins)
Time.Estimated...: Thu Mar 31 14:50:47 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\allinone.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     2917 H/s (0.25ms) @ Accel:256 Loops:16 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 41399592/41399592 (100.00%)
Rejected.........: 0/41399592 (0.00%)
Restore.Point....: 41399592/41399592 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: CaZZy06 -> Caш╝ЭчЯ│
Hardware.Mon.#1..: Temp: 60c Fan: 62% Util: 73% Core:1886MHz Mem:6794MHz Bus:16

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: seoincorporation on March 31, 2022, 05:41:50 PM
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

A great tool that I recommend is Crunch:

Code:
:~$ crunch 5 5 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@
Crunch will now generate the following amount of data: 1429968 bytes
1 MB
0 GB
0 TB
0 PB
Crunch will now generate the following number of lines: 238328

As example with that command, we can generate al the combinations for the 5 Chars password including Caps and Numbers.

If we want to generate a dictionary for 6 chars then we should use:

 
Code:
:~$ crunch 6 6 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@

I hope this helps:

https://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on March 31, 2022, 06:14:05 PM
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
Which one? Give me the Torrent links you want, there are far too many files there for me to check all of them.

Code:
:~$ crunch 6 6 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@
Nice one! I made them in different lengths:
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/5.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/6.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/7.txt (still uploading, I can't install crunch on this server)
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/8.txt (476 GB, I'm creating the file on one server and saving it to this location. At the rate it's going it'll take at least half a day to complete. Chances are something will break before it's done) Update: After 235 GB, it exceeded it's disk quota. This server will be wiped in 5 days.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 31, 2022, 08:19:07 PM
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

...
I don’t know the password and I don’t have a list, I only know that the first 2 letters are “Ca”
and I don’t even know if this is one word or several identical words or is it a phrase written without space characters and so on.
So my hope is that someone stole this password from some server or somewhere else since 2015 when the wallet was encrypted in early March.

When trying to encrypt a wallet for the first time, you may see a recommendation on the screen that
the password must be 10 characters long or a few words long.


Therefore, we cannot hope and use the brute force method, there are no such resources on the planet yet,
but we can hope that the password was once stolen and a match will be found.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on March 31, 2022, 08:27:51 PM
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist[/quote]
Which one? Give me the Torrent links you want, there are far too many files there for me to check all of them.

...
Also I try HASH attack by MASK
for example: Ca******
as can you see all 8 symbols passwords we check (BruteForce) and no results...

Let's go to finding all passwords, contains 10 and 10+ symbols please...

Please use any archiver
ARJ
ZIP
7zip
and servers for temporary and free files storage.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PawGo on April 01, 2022, 08:26:57 AM

2.-We read all the files and send all the passwords that start with 'Ca' to a new file:

Code:
cat *.txt | grep '^Ca*' >> my_dic.txt


Shouldn't it be:
Code:
 grep '^Ca.*$'
?
Your regex in grep returned all lines starting with "C", second character was not limited to 'a'.

I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
https://easyupload.io/ognas8


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 01, 2022, 08:41:28 AM
Shouldn't it be:
Code:
 grep '^Ca.*$'
I used this:
Code:
grep "^Ca"


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PawGo on April 01, 2022, 08:48:44 AM
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

A great tool that I recommend is Crunch:

As example with that command, we can generate al the combinations for the 5 Chars password including Caps and Numbers.


OK, but why?
As he is using hashcat, he may use masks which do the same inside program.
He may also configure mixed mode, where each word from the list could be internally modified, something may be appended etc. And honestly speaking I think he should use this, as relying on pure words list could be not enough.

The only advantage of using crunch I see, is that having precalculated passwords you may externally control the work done, otherwise you must rely on checkpoints saved by hashcat.,


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 01, 2022, 09:41:24 AM
I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
https://easyupload.io/ognas8
[/quote]

That's great, you're in the $10,000 race too...

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca1openwall.txt
* Passwords.: 1697
* Bytes.....: 17001
* Keyspace..: 1697
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$****************************************
Time.Started.....: Fri Apr 01 12:43:11 2022 (2 mins, 10 secs)
Time.Estimated...: Fri Apr 01 12:45:21 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca1openwall.txt)
Guess.Queue......: 1/4 (25.00%)
Speed.#1.........:       13 H/s (0.34ms) @ Accel:1024 Loops:32 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1697/1697 (100.00%)
Rejected.........: 0/1697 (0.00%)
Restore.Point....: 1697/1697 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cayce -> Cazzie
Hardware.Mon.#1..: Temp: 43c Fan: 46% Util: 74% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca2openwall.txt
* Passwords.: 3754
* Bytes.....: 41038
* Keyspace..: 3754
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*******************************************
Time.Started.....: Fri Apr 01 12:45:21 2022 (2 mins, 41 secs)
Time.Estimated...: Fri Apr 01 12:48:02 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca2openwall.txt)
Guess.Queue......: 2/4 (50.00%)
Speed.#1.........:       23 H/s (0.17ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 3754/3754 (100.00%)
Rejected.........: 0/3754 (0.00%)
Restore.Point....: 3754/3754 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Causeries du Lundi -> Cazzie
Hardware.Mon.#1..: Temp: 41c Fan: 46% Util: 63% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca3Rocktastic12a.txt
* Passwords.: 4236653
* Bytes.....: 51778356
* Keyspace..: 4236653
* Runtime...: 1 sec

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$**************************************
Time.Started.....: Fri Apr 01 12:48:03 2022 (45 mins, 32 secs)
Time.Estimated...: Fri Apr 01 13:33:35 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca3Rocktastic12a.txt)
Guess.Queue......: 3/4 (75.00%)
Speed.#1.........:     1551 H/s (0.16ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 4236653/4236653 (100.00%)
Rejected.........: 0/4236653 (0.00%)
Restore.Point....: 4236653/4236653 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cazzyy@3 -> Cardiff2025!
Hardware.Mon.#1..: Temp: 41c Fan: 45% Util: 62% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca4weakpass3w.txt
* Passwords.: 1227107
* Bytes.....: 14385707
* Keyspace..: 1227107
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$***************************************
Time.Started.....: Fri Apr 01 13:33:35 2022 (13 mins, 34 secs)
Time.Estimated...: Fri Apr 01 13:47:09 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca4weakpass3w.txt)
Guess.Queue......: 4/4 (100.00%)
Speed.#1.........:     1507 H/s (0.17ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1227107/1227107 (100.00%)
Rejected.........: 0/1227107 (0.00%)
Restore.Point....: 1227107/1227107 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cazzones -> Cazzzzoduro1000
Hardware.Mon.#1..: Temp: 42c Fan: 46% Util: 60% Core:1199MHz Mem:6794MHz Bus:16


Let's go to finding all passwords, contains 10 and 10+ symbols please...

Please use any archiver
ARJ
ZIP
7zip

and servers for temporary and free files storage.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: seoincorporation on April 01, 2022, 02:56:26 PM
...
Let's go to finding all passwords, contains 10 and 10+ symbols please...
...

10 chars passwords are huge for brute force, I try with crunch without symbols and we are talking about a 2 PB file:

Code:
bitcoin@forum:~$ crunch 10 10 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@@@@@
Crunch will now generate the following amount of data: 2401741161433856 bytes
2290478860 MB
2236795 GB
2184 TB
2 PB
Crunch will now generate the following number of lines: 218340105584896

Another good option could be to run crunch direct in the cracking command with HashCat. That way you generate the passwords at the moment without loading them from a huge file.

This article explains how to do that:

https://saketupadhyay.medium.com/pipe-brute-force-attack-via-password-generator-2dcaab91e88e


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 01, 2022, 04:49:43 PM
Quote
10 chars passwords are huge for brute force, I try with crunch without symbols and we are talking about a 2 PB file:

Thanks for your research. Indeed, we do not deal with the brute force method for guessing a password.
We know the first 2 letters are "Ca" and therefore we extract all passwords with a length of 10 or more characters from dictionaries already available on the network.

For example password is: Ca******** = 10 characters and more... Only by such a template you need to extract passwords from dictionaries.

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" & "PawGo" - Can you create another dictionary from this list? https://weakpass.com/wordlist


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PawGo on April 01, 2022, 09:05:37 PM
I think you have enough passwords. Do not have hope that someone else used the same. In my opinion you should launch a hybrid attack. Think what you would like to append (or prepend) to existing password and prepare the correct mask.
https://hashcat.net/wiki/doku.php?id=hybrid_attack
https://hashcat.net/wiki/doku.php?id=rule_based_attack


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: alexeyneu on April 01, 2022, 09:45:01 PM
but what we really have here? you're talkin that someone lost the password from 7k bucks wallet. Then he told second guy that first symbols are c a and gave him this wallet.and this second guy has -2 trust already . idk what else to say


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 02, 2022, 06:50:45 AM
I think you have enough passwords. Do not have hope that someone else used the same. In my opinion you should launch a hybrid attack. Think what you would like to append (or prepend) to existing password and prepare the correct mask.
https://hashcat.net/wiki/doku.php?id=hybrid_attack
https://hashcat.net/wiki/doku.php?id=rule_based_attack

You don’t understand that I didn’t use dictionaries from this site: https://weakpass.com/wordlist
because I can’t pull out passwords whose first two letters are “Ca”, so I don’t have passwords,
there is only your work, what you send me and this the only hope is to find the correct password.
If you are tired and lazy, then do not participate in this process. Write here which dictionaries
You have used and downloaded so that other people do not do the same job twice. Thank You!



Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 02, 2022, 07:07:54 AM
but what we really have here? you're talkin that someone lost the password from 7k bucks wallet. Then he told second guy that first symbols are c a and gave him this wallet.and this second guy has -2 trust already . idk what else to say

There are bitcoins in the wallet, but there are not many of them. What $7,000 are you talking about, are you delusional?
My trust is "-2" just because one idiot thought I had a multi-account, and another thought that we were not qualified enough to work in this business, but he idiot is not our client! Our "-2" trust is irrelevant to this case and means nothing. Just like the "+2" trust.
The fact is that there is a genuine wallet and there is reliable information that the password starts with the first letters "Ca", there are many passwords on the site with a collection of dictionaries, but there is no time to check them all and there is no point.
There are a couple of guys here who downloaded large dictionaries and somehow managed to pull out all the passwords that start with the first two letters "Ca", but I checked with the "Hashcat" program and these passwords could not open the wallet.
We need to make a list of dictionaries that we have already checked and download other dictionaries in order to check all the passwords that are on the site. What is not clear here, in what language to write here, I don’t understand, asking such stupid questions is some kind of nightmare.


For example password is: Ca******** = 10 characters and/or more...
Only by such a template we need to extract passwords from dictionaries.
Who want and can CONTINUE to create another dictionaries from this list?
https://weakpass.com/wordlist


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 02, 2022, 07:28:33 AM
For example password is: Ca******** = 10 characters and/or more...
Only by such a template we need to extract passwords from dictionaries.
Who want and can CONTINUE to create another dictionaries from this list?
https://weakpass.com/wordlist
I can continue, but like I said: you'll have to select which .torrents to download by yourself. There are 107 pages on that site, each with 15 download links. If you select them, I'll get you anything that starts with Ca. But I'll need a list that I can easily process.
The Download link itself seems to work fine too, I get 70 MB/s which is even easier than the Torrent. I can pipe the download to extract it and only save the result.
Example:
Code:
wget -O- https://download.weakpass.com/wordlists/1326/b0n3z-sorted-wordlist.gz | gunzip | grep -a "^Ca" > b0n3z-sorted-wordlist.txt
This 23 GB file takes 7 minutes to process.

If you get me a list of all ~1500+ links, I'll extract them all. But I'm not going to copy that many links myself.
I'll even remove duplicates for you :)


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 02, 2022, 08:51:28 AM
For example password is: Ca******** = 10 characters and/or more...
Only by such a template we need to extract passwords from dictionaries.
Who want and can CONTINUE to create another dictionaries from this list?
https://weakpass.com/wordlist
I can continue, but like I said: you'll have to select which .torrents to download by yourself. There are 107 pages on that site, each with 15 download links. If you select them, I'll get you anything that starts with Ca. But I'll need a list that I can easily process.
The Download link itself seems to work fine too, I get 70 MB/s which is even easier than the Torrent. I can pipe the download to extract it and only save the result.
Example:
Code:
wget -O- https://download.weakpass.com/wordlists/1326/b0n3z-sorted-wordlist.gz | gunzip | grep -a "^Ca" > b0n3z-sorted-wordlist.txt
This 23 GB file takes 7 minutes to process.

If you get me a list of all ~1500+ links, I'll extract them all. But I'm not going to copy that many links myself.
I'll even remove duplicates for you :)

If I knew which dictionary contains the password I need, then it would be much easier and faster. But the problem is that I don't know which dictionary contains the password and whether it is in any of the dictionaries at all.
I only know that the password was created by a human, not a robot, and that this password was set in March 2015 and has not changed since then. Therefore, this password could be stolen by hackers and entered the collection of these dictionaries. Also I know that the password has the first two letters "Ca" and the password cannot be shorter than 10 characters. Brute force is useless, so all hope is for dictionaries.
Okay, I will prepare for you a list of torrent links and dictionary names. We will keep records and cross out dictionaries that have already been checked.
I need a couple of days or less to complete this work.

Update:
I propose to start by processing these 3 dictionaries: https://weakpass.com/all-in-one
1) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one.7z.torrent
2) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one_p.7z.torrent
3) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one_w.7z.torrent


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: alexeyneu on April 02, 2022, 09:13:16 AM
what if this dude just joking about c a giving you wallet?
another thing is that neither he nor you  have money now. haha


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 02, 2022, 09:53:53 AM
what if this dude just joking about c a giving you wallet?
another thing is that neither he nor you  have money now. haha

if you want to troll, then this is not the place for you, we are busy with serious work here.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: alexeyneu on April 02, 2022, 10:07:04 AM
really? ok looks like that's an answer


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 03, 2022, 05:17:44 PM
I only know that the password was created by a human, not a robot, and that this password was set in March 2015 and has not changed since then. Therefore, this password could be stolen by hackers and entered the collection of these dictionaries.
If the password is only used for this wallet, the wallet would have been emptied if the password had been leaked. If the same password was used for several different websites it could have been leaked without compromising the wallet, but if it was used on many websites I don't think it's likely it the owner would have forgotten it.

It looks like 7z can't be extracted from stdin:
First, 7-Zip supports only some archive types for piping. For -si, it accepts xz, lzma, tar, gzip and bzip2. For -so, it accepts xz, gzip, bzip2 and tar.
That means I have to download those files first, before extracting them (and messing with this since yesterday delayed my response).

Update:
I propose to start by processing these 3 dictionaries: https://weakpass.com/all-in-one
1) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one.7z.torrent
2) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one_p.7z.torrent
3) https://download.weakpass.com/wordlists/all-in-one/1/all_in_one_w.7z.torrent
From Costas at StackExchange.com (https://unix.stackexchange.com/questions/184519/how-to-grep-for-line-length-in-a-given-range):
Code:
grep -x '.\{3,10\}'
I got anything from 8 to 20 characters, starting with "Ca". See le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt (http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt) (this server expires in 3 days, I'm going to miss the 16 cores and 128 GB RAM).

There's another problem with the list: there are some empty lines in it, which must be caused by some very weird characters.

Reminder for myself:
Code:
p7zip -c -d all_in_one.7z | grep -a "^Ca" | grep -ax '.\{8,20\}' | sort -u -S 20% | gzip >> output.txt.gz


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 04, 2022, 11:11:16 AM
I got anything from 8 to 20 characters, starting with "Ca". See le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt (http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt) (this server expires in 3 days, I'm going to miss the 16 cores and 128 GB RAM).

Dear friend!
Why can't you pack this file "all_in_one_3.txt" into an archive (7zip, ARJ, ZIP etc)
and then post it to the public via a link? You can download from: https://7-zip.org
462 Mb (before 7-zip)
64,5 Mb (after 7-zip)

Also I see inside this passwords:
...
Ca$$0411 (8 characters)
Ca$$0411 (8 characters)
Ca$$0496 (8 characters)
Ca$$0496 (8 characters)
Ca$$_05 (7 characters)
Ca$$0697 (8 characters)
...

We need a humans passwords of 10 or more characters only :-)
-----------------------------------------------------------------------
Also You can delete this files, because it is a bruteforce method:
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/5.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/6.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/7.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/8.txt
-----------------------------------------------------------------------

Dictionary cache built:
* Filename..: f:\hashcat\wallet\all_in_one_3.txt
* Passwords.: 38065930
* Bytes.....: 484817732
* Keyspace..: 38065930
* Runtime...: 3 secs
...


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 04, 2022, 12:04:52 PM
Why can't you pack this file "all_in_one_3.txt" into an archive
Piping it through gzip is no problem. I'll do that right now on all .txt files, see here (http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/) when it's done.

Quote
462 Mb (before 7-zip)
64,5 Mb (after 7-zip)
It's slightly bigger using gz, but it's a more common (and much faster) compression method.

Quote
Also I see inside this passwords:
...
Ca$$0411 (8 characters)
Ca$$0411 (8 characters)
Are you sure there's a duplicate? That shouldn't have happened. If it did, I forgot a "-u" option somewhere.

Quote
We need a humans passwords of 10 or more characters only :-)
I figured I'd give you some more marging in case it's shorter anyway.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: seoincorporation on April 04, 2022, 02:01:51 PM
Quote
Also I see inside this passwords:
...
Ca$$0411 (8 characters)
Ca$$0411 (8 characters)
Are you sure there's a duplicate? That shouldn't have happened. If it did, I forgot a "-u" option somewhere.
...

I just sha256 on both strings to verify they are the same, and yes they are:

Code:
forum@bitcoin:~$ echo 'Ca$$0411' | sha256sum
f5985cfee81e0a3636fa3a5ca5c1c22b0e4a4b97571d840c917f4a903c8fbb1b  -
forum@bitcoin:~$ echo 'Ca$$0411' | sha256sum
f5985cfee81e0a3636fa3a5ca5c1c22b0e4a4b97571d840c917f4a903c8fbb1b  -

My guess is one of those has an space in front of it, and we can remove those with sed:

Code:
sed 's/ //g'

Remember to use sed before sort.  ;)


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 04, 2022, 03:07:04 PM
I just sha256 on both strings to verify they are the same, and yes they are:
I was more curious if OP copied the same line twice. But I confirmed it's in the file.

I did sort -u again, but it's still in there twice.
I tried sort -u | uniq, with the same result.

This just doesn't make sense:
Code:
cat all_in_one_3.txt | grep 'Ca$$0411' | sort -u | uniq           
Ca$$0411
Ca$$0411

It turns out they're different after all. It just can't be displayed:
Code:
for i in `cat all_in_one_3.txt | grep 'Ca$$0411' | sort -u | uniq`; do echo $i | md5sum; done
bb63f44bb7d31b5d58e0e4fc75906e9c  -
241b4b251694cb0f29632a89fbde1672  -

Quote
My guess is one of those has an space in front of it
That's not possible after grep "^Ca".


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PawGo on April 04, 2022, 03:15:42 PM

If you are tired and lazy, then do not participate in this process. Write here which dictionaries
You have used and downloaded so that other people do not do the same job twice. Thank You!


Oooh, real gentleman's talk. That's how you make friends?

By the way, I wrote clearly:
I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
Source dictionary was specified in filename.

Could you clarify based on what you assume that password used on that wallet file is for sure in one of leaked passwords list?
You would quickly extend dictionary to desired number of characters (by the way owner should remember if it was 10 or 20 characters, as it is 100% change) using hybrid mode and extending each of known words by custom set of digits or special characters.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 04, 2022, 03:56:14 PM

If you are tired and lazy, then do not participate in this process. Write here which dictionaries
You have used and downloaded so that other people do not do the same job twice. Thank You!


Oooh, real gentleman's talk. That's how you make friends?

By the way, I wrote clearly:
I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
Source dictionary was specified in filename.

Could you clarify based on what you assume that password used on that wallet file is for sure in one of leaked passwords list?
You would quickly extend dictionary to desired number of characters (by the way owner should remember if it was 10 or 20 characters, as it is 100% change) using hybrid mode and extending each of known words by custom set of digits or special characters.

Cash prizes will be given to all who participated in the process.
Prize number 1 - $10,000 for the person whose dictionary contains the password.
Prize number 2 - $ 3000 who participated
Prize number 3 - $ 3000 who participated
Prize number 4 - $ 3000 who participated
I don't think there will be more than 4 helpers. Now I see 2 helpers.

We will not do brute force or search by mask yet, it takes a lot of resources and time.
So far, we have hope that the password was stolen in 2015 and is in one of the dictionaries.
The password is 10 or more characters, including the first two letters "Ca".


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PawGo on April 04, 2022, 04:01:31 PM
It would be useful if you post (for example one the first page) the list of already processed files / dictionaries / sources (and maybe size of dic/nb of files)
It is easier to check in one place than read the whole topic and look for filenames.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: LoyceV on April 04, 2022, 04:37:53 PM
It would be useful if you post (for example one the first page) the list of already processed files / dictionaries / sources (and maybe size of dic/nb of files)
If All wordlists in one (https://weakpass.com/all-in-one) does what the name says, this includes all other lists:
Quote
This wordlist is the compilation of all wordlists in one. It may be helpful to create a table-lookup for hashes and password search.
It also says that All-in-One-P and All-in-One-Wi-Fi are subsets of All-in-One. So that makes searching further on weakpass.com futile.



I counted: the 57 GB all_in_one.7z file has 40,247,321,168 passwords. After several hours, I found out that's the exact same amount mentioned on weakpass.com already ;)


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 04, 2022, 04:48:42 PM
It would be useful if you post (for example one the first page) the list of already processed files / dictionaries / sources (and maybe size of dic/nb of files)
It is easier to check in one place than read the whole topic and look for filenames.

You are absolutely right, I wrote about this, but I do not receive information about the names of dictionaries that have already been processed.
Those who processed these dictionaries know about it. I can make a list and pin at the beginning of the topic, and I will update this list. Thanks!


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on April 04, 2022, 05:42:43 PM
Quote
I got anything from 8 to 20 characters, starting with "Ca". See le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt (http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/all_in_one_3.txt)

Dictionary cache built:
* Filename..: f:\hashcat\wallet\all_in_one_3.txt
* Passwords.: 38065930
* Bytes.....: 484817732
* Keyspace..: 38065930
* Runtime...: 3 secs
...

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$***********************************************
Time.Started.....: Mon Apr 04 14:20:03 2022 (6 hours, 20 mins)
Time.Estimated...: Mon Apr 04 20:40:37 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\all_in_one_3.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     1667 H/s (0.16ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 38065930/38065930 (100.00%)
Rejected.........: 0/38065930 (0.00%)
Restore.Point....: 38065930/38065930 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Caя┐╜adas -> CaшкШчЩ║цAзCaцФ╛xЗ║
Hardware.Mon.#1..: Temp: 41c Fan: 45% Util: 63% Core:1199MHz Mem:6794MHz Bus:16


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: PrivatePerson on April 17, 2022, 08:52:49 AM
"Excellent" service...
Is your whole service just about extracting a hash from a file and inserting it into a hashcat?
Post the hash or file here.


Title: Re: Bounty 10000$ Who can help me recall password!
Post by: walletrecovery on May 27, 2022, 07:15:40 PM
"Excellent" service...
Is your whole service just about extracting a hash from a file and inserting it into a hashcat?
Post the hash or file here.


If I show HASH here, then whoever finds the password will take all the coins for themselves.
This wallet accidentally fell into the hands of merchants and is now being sold online for little money,
because the merchants do not know anything about these hints.