Hey there, I'm in the same boat, did you find btcrecover easy to use or ?
Any hints or tips on how to use? I'm a bit of a noob.
Also i have like 5 different passwords i may have used ..
If you need help installing BTCRecover there's a
tutorial with an installation guide for getting you the Python packages necessary for cracking wallet.dat passwords. Specifically, after you download BTCrecover, you need
Python 2.7 and pycrypto, which you can install with
pip install pycrypto inside a command prompt. If you're on Windows use this
pycrypto installer instead.
Ben you got to copy your wallet.dat into the folder that BTCRecover is in and then run
btcrecover --passwordlist LIST.txt --wallet wallet.dat (LIST.txt is a file containing possible passwords, see below on how to make it)
You use lists called
token files which contain combinations of words that might appear (the tokens) and which order they appear in. Exactly what you put in there depends on how well you remember your password.
If you forgot just one or two words, you can put the following in a file (lets pretend your password is 6 words long):
^1^your_first_word
^2^your_second_word
...and so on, don't type this line but keep putting the rest of the words you remember with their word positions here
^5^maybe_word1 maybe_word2 maybe_word3
^6^another_maybe_word1 another_maybe_word2 another_maybe_word3
Will try all combinations of the password with
maybe_word1/2/3 as the 5th word and
another_maybe_word1/2/3 as the 6th word.
If there is a space in your password the. escape it with %s. For example this:
matches
qwerty uiop asdf.
But since you have 5 different passwords I'm guessing that they're all variations of one another. In that case you can use the for
--typos NUMBER_Of_TYPOS option to tell BTCRecover there are a fixed number of typos and for each typo, apply one of these operations:
With the --typos # command-line option (with # replaced with a count of typos), you tell btcrecover up to how many typos you’d like it to add to each password (that has been either generated from a token file or taken from a passwordlist as described above). You must also specify the types of typos you’d like it to generate, and it goes through all possible combinations for you (including the no-typos-present possibility). Here is a summary of the basic types of typos along with the command-line options which enable each:
--typos-capslock - tries the whole password with caps lock turned on
--typos-swap - swaps two adjacent characters
--typos-repeat - repeats (doubles) a character
--typos-delete - deletes a character
--typos-case - changes the case (upper/lower) of a single letter
If this is confusing to you there are stock example you can directly insert from
this page. This option is supposed to be used in conjunction with --passwordlist, so you will want to make a file with your five password guesses on each line, and it will also search for typos and misspellings of those.