Also, it's possible to use
the "multibit2john.py" script (that is part of JohnTheRipper) to extract a hash from either a multibit .key (preferred option) or a multibit .wallet file (VERY slow to crack as it is encrypted with Scrypt).
The hash output from multibit2john.py will look something like this (for a .key file):
cwoern.key:$multibit$1*0b4989bdf01e4746*02d61e0c77e7131cb12a638ed742f571ba884621f4e0bebdfc900357cd9a310a
Once you have the hash, you can use
"hashcat" to attempt to crack the password.
To do that, we copy everything
after the ":" and put it into a .txt file like this:
$multibit$1*0b4989bdf01e4746*02d61e0c77e7131cb12a638ed742f571ba884621f4e0bebdfc900357cd9a310a
And then the hashcat commandline should be something like:
hashcat -m 22500 -a 3 multibit_hash.txt <PUT YOUR HASHCAT "MASK" HERE>
You can practise using the hash above... and the mask ?a?a?a?a?a?a:
hashcat -m 22500 -a 3 multibit_hash.txt ?a?a?a?a?a?a
And it
should find the password "abc123" relatively quickly. For your .key/hash, you'll need to experiment with different "masks" based on what you believe the password is likely to be... refer here:
https://hashcat.net/wiki/doku.php?id=mask_attackFinally, unless you have a fairly good idea of what the password was likely to be, and that it's relatively short... your chances of bruteforcing it aren't great