Bitcoin Forum
April 24, 2024, 03:42:31 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: I forgot password of my wallet.dat file from 2013 "13.8 BTC"  (Read 1659 times)
lankymanx
Newbie
*
Offline Offline

Activity: 84
Merit: 0


View Profile
September 16, 2019, 12:39:43 AM
 #21

Hi, i have downloaded this btcrecovery program and read the help and tried to prepare the tokens.txt and so on but i still dont understand it.

How do i brute force a password of whatever length, it should surely be just like it is for a ZIP file

This python script looks really good, but the help and the syntax is what i am really struggling to understand .

If somebody can please tell me how to brute force using a character set i believe i know i used.


So surely i can say something like btcrecovery --wallet wallet.dat -- something min and max or --charset AaBbCceGHLKn56@#%
something like this
1713930151
Hero Member
*
Offline Offline

Posts: 1713930151

View Profile Personal Message (Offline)

Ignore
1713930151
Reply with quote  #2

1713930151
Report to moderator
1713930151
Hero Member
*
Offline Offline

Posts: 1713930151

View Profile Personal Message (Offline)

Ignore
1713930151
Reply with quote  #2

1713930151
Report to moderator
If you want to be a moderator, report many posts with accuracy. You will be noticed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713930151
Hero Member
*
Offline Offline

Posts: 1713930151

View Profile Personal Message (Offline)

Ignore
1713930151
Reply with quote  #2

1713930151
Report to moderator
1713930151
Hero Member
*
Offline Offline

Posts: 1713930151

View Profile Personal Message (Offline)

Ignore
1713930151
Reply with quote  #2

1713930151
Report to moderator
1713930151
Hero Member
*
Offline Offline

Posts: 1713930151

View Profile Personal Message (Offline)

Ignore
1713930151
Reply with quote  #2

1713930151
Report to moderator
prix
Hero Member
*****
Offline Offline

Activity: 750
Merit: 511


View Profile
September 17, 2019, 03:22:37 AM
 #22

So surely i can say something like btcrecovery --wallet wallet.dat -- something min and max or --charset AaBbCceGHLKn56@#%
something like this

You can use regular expression.
To specify min 5 and max 10 you should use:

--regex-only "^.{5,10}$"

If you want add characters:

--regex-only "^[AaBbCceGHLKn56@#%]{5,10}$"

You can test your regex before use on the site like https://regex101.com/

Or you should use wildcards in the Token File (tokens.txt):
See https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#expanding-wildcards
Quote
%1,3[chars] - between 1 and 3 of the characters between [ and ]
So use %5,10[AaBbCceGHLKn56@#%]

Quote
python btcrecover.py --wallet wallet.dat --tokenlist tokens.txt


Maybe I am wrong in details, I can't check it now, but you can test it:
Quote
btcrecover will then list out all the passwords to the screen instead of actually testing them against a wallet file
...
python btcrecover.py --listpass --tokenlist tokens.txt | more
I think you can use 'listpass' to test regex too.
bartekjagoda
Jr. Member
*
Offline Offline

Activity: 87
Merit: 5


View Profile
September 17, 2019, 04:29:20 PM
 #23

To protect you from a big mistake i wrote you a Tutorial for BTCRecover (even if I'm a fan of hashcat  Grin)

I make this Step-by-Step because I think that you do not really know about such things - sorry if i am wrong.

Step 1.) Download BTCRecover from Github: (https://github.com/gurnec/btcrecover
Step 2.) Extract the files to your Desktop, now you should have a folder named "btcrecover-master" on your Desktop
Step 3.) Create a new .txt-file on your Desktop and name it tokens.txt - Open the tokens.txt and write this in it: %6P then put the tokens.txt into the "btcrecover-master" folder
Step 4.) Make a Copy of your Wallet.dat and copy it in the btcrecover-master folder - Now you have your tokens.txt and your Wallet.dat in the btcrecover-master folder.
Step 5.) Open the command prompt, now you should see this: "C:\Users\XYZ" type here now: "cd desktop" than "cd btcrecover-master" now it should look like this: "C:\Users\XYZ\Desktop\btcrecover-master>"
Step 6.) Ok, last Step, type this into the commend prompt: "C:\python27\python btcrecover.py --wallet wallet.dat --no-dupchecks --tokenlist tokens.txt"
Step 7.) Wait for btcrecover to crack your password

I tried to make it as easy as possible - hope you can handle it

If you have not installed Python you have to do it first otherwise btcrecover will not work

If that's too complicated for you, I strongly advise you only to work with Dave from https://walletrecoveryservices.com/ - He is definitely trustworthy.


If you wait for a magic button that unlocks your wallet - good luck with it!

Quote
This guy asks for 20% of the wallet value, which is utterly ridicolous as his reward would be around 40k USD with the current rates alone.
that is the Generally-fee, in this case, he will certainly take less, the wallet has 13 BTC and the password is cracked in 1min (if it really only has 6 characters)

~Cheers



You can also use other services. There is at least 2 more major with bigger hash rate. and i doubt the service above would bother with such a small wallet when there is 10k btc wallet offered for various recovery services.

 Ich liebe Bitcoin
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
September 17, 2019, 05:07:58 PM
 #24

You can also use other services. There is at least 2 more major with bigger hash rate.

But not a single one is as reputable and trusted as daves recovery service.



and i doubt the service above would bother with such a small wallet when there is 10k btc wallet offered for various recovery services.

They would definitely try to recover it if there is a chance in finding the password.
This wouldn't be the smallest wallet being recovered by them. I know at least one person who got a wallet containing between 1 and 3 BTC recovered by them. I doubt 13 BTC wouldn't be enough.

lankymanx
Newbie
*
Offline Offline

Activity: 84
Merit: 0


View Profile
September 27, 2019, 06:45:51 AM
 #25

So surely i can say something like btcrecovery --wallet wallet.dat -- something min and max or --charset AaBbCceGHLKn56@#%
something like this

You can use regular expression.
To specify min 5 and max 10 you should use:

--regex-only "^.{5,10}$"

If you want add characters:

--regex-only "^[AaBbCceGHLKn56@#%]{5,10}$"

You can test your regex before use on the site like https://regex101.com/

Or you should use wildcards in the Token File (tokens.txt):
See https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#expanding-wildcards
Quote
%1,3[chars] - between 1 and 3 of the characters between [ and ]
So use %5,10[AaBbCceGHLKn56@#%]

Quote
python btcrecover.py --wallet wallet.dat --tokenlist tokens.txt


Maybe I am wrong in details, I can't check it now, but you can test it:
Quote
btcrecover will then list out all the passwords to the screen instead of actually testing them against a wallet file
...
python btcrecover.py --listpass --tokenlist tokens.txt | more
I think you can use 'listpass' to test regex too.


Thank you , slightly confussed here.
So i use --regex-only on the command line along with its value of exactly this string ....  "^[AaBbCceGHLKn56@#%]{5,10}$"     (including the double quotes?)
is this an OR .. or do i need to using --tokenlis still and then put that string in the tokens.txt file .... for example in that file i have my password which is 3 words which i have broken up in 3 lines.... as  a test.
Thing is i really want to crack against certain custom character set and not all 26 letters of the alphabet.
Still just trying to get the hang of what my command should be and what text/token file i need.
really not sure why it written like this anyways, programs like accent password recovery and elcomsoft specifically have a custom character set field in which you type your characters and there is no mention or need of a second file or token file, its just crazy.

Sorry, almost getting it but not quite man, please see if you can help me again.

so example... my password would be SugarSwe3T   
so i would say ->  python btcrecover.py --listpass --tokenlist tokens.txt     <-  so inside int eh tokens.txt file i need to put what?
tokens.txt :
line 1 - %5,10[AaBbCceGHLKn56@#%     <-  so the 5,10 means string of 5-10 chars? and using only those characters?  [AaBbCceGHLKn56@#% <- where is the other square bracket ?


or do u just write this character set on the command  line  and no need for a tokens.txt file?

*sigh*
Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
September 27, 2019, 02:41:27 PM
 #26

He never came back, and the original coins on the address has never moved. If I were him, as soon as I'd get the password, I would move the coins to a different address. He'd also have all the forks since then.

mskryxz
Sr. Member
****
Offline Offline

Activity: 433
Merit: 250


View Profile
November 04, 2019, 08:15:34 PM
 #27

Check out walletrecoveryservices.com they have helped many users from different wallet types in recovering their password as long as you remember some part of it or otherwise it would be near impossible.
Kprawn
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
November 05, 2019, 08:03:46 PM
 #28

Just a quick question here, if it takes only a few hours to crack a 6 character password, why are malware not simply targeting the wallet.dat

files and sending them to the hackers when they are found? I think most people are too lazy to use longer passwords, so they will have a field day,

just sitting back and recovering coins from all these wallet.dat files that are send to them.  Huh  I tried this and it was relatively easy to do this

with the manual that was provided here.  Roll Eyes  Luckily my passwords are all a lot longer and more complex and my main hoard is not stored in these

types of wallets.  Grin

THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
keychainX
Member
**
Offline Offline

Activity: 374
Merit: 53

Telegram @keychainX


View Profile WWW
November 07, 2019, 08:20:09 AM
 #29

Just a quick question here, if it takes only a few hours to crack a 6 character password, why are malware not simply targeting the wallet.dat

files and sending them to the hackers when they are found? I think most people are too lazy to use longer passwords, so they will have a field day,

just sitting back and recovering coins from all these wallet.dat files that are send to them.  Huh  I tried this and it was relatively easy to do this

with the manual that was provided here.  Roll Eyes  Luckily my passwords are all a lot longer and more complex and my main hoard is not stored in these

types of wallets.  Grin

There are many malaware looking for private keys, wallet.dat files etc. Hackers are even putting out fake github repos, so when you think you are downloading an updated version of pywallet or btcrecover the code includes a call to execute more malicioue code in the cloud.

I even had a person recently sending a "lost" wallet with possible passwords in a word document that contained a trojan virus.

So its actually out  in the wild, unfortunately...

/KX

Dabs
Legendary
*
Offline Offline

Activity: 3416
Merit: 1912


The Concierge of Crypto


View Profile
November 08, 2019, 03:11:53 PM
 #30

why are malware not simply targeting the wallet.dat

Those malware would have to be more sophisticated, they'd need to know if the computer could send files or email them or something (or run them through public SMPT or other servers maybe).

The ones that are flying around are simple clipboard malware, those work almost instantly as when a victim pastes the wrong address and hits send, it goes to the malware author directly.

Malware authors wouldn't waste time, 6 hours, cracking passwords when they can just trick you into either unlocking your wallet for them (keylogger) or just sending to them "accidentally" with a copy paste clipboard thing.

UAE Seasider
Full Member
***
Offline Offline

Activity: 700
Merit: 110

Helios Protocol https://discord.gg/cpzAEMB


View Profile
December 09, 2019, 09:44:28 PM
 #31

I was in a similar situation, had lost the password to a Bitcoin Core wallet with 12.5 BTC and the same amount from Forks in BCH and BSV. I had tried on and off for almost 2 years to crack it using brute force software with familiar words and even random characters all to no avail.

I had heard of Wallet Recovery Services and after giving up accomplishing the job myself I decided to get in touch with Dave. He was professional and helpful throughout the process asked me for my best guesses and any peculiar formatting that I thought may help. It took them around 3 weeks to decypher my password and as soon as he had done this he emailed me with the update.

They charge a 20% fee for the service but considering I had written off the investment it was well worth it to recover my funds. After all, 80% of something is better far than 100% of nothing  Wink

Dave is reliable, honest and a frigging genius, I cannot recommend them enough for anyone that slipped up and lost the access to their wallets.

https://walletrecoveryservices.com/



HELIOS PROTOCOL ★ ✅[DAG]✅[BLOCKCHAIN]✅[PoS]✅[Masternodes] ✈✈✈[weekly Airdrop][join our discord to qualify]✈✈✈
 ▬▬  Mainnet Launched  |  Parallel Blockchain  ▬▬ 
 ▐▐▐▐▐▐▐▐ Website  |  Github  |  Bitcointalk  |  Bounties  |Discord  |  telegram▐▐▐▐▐▐▐▐
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!