Hello
I am trying to brute force my old wallet.dat with btcrecover I need to shorten the combination some how
I am currently running Firepro W8000, but I also have Firepro W9100 that I am planing to install
The time I am getting with W8000 TIME: 1day, 22:33:33, but if I can lower the combinations and add my 2nd GPU I can break my password much faster
Let me give you an example:
Let's say my mid part of the password is "password"
Front part is the same as the end part Example: "1234password1234"
What I did in my tokens.txt
%c%c%c%cpassword%c%c%c%c
and the command I use
python btcrecover.py --wallet wallet.dat --custom-wild 1234 --tokenlist tokens.txt --enable-gpu
Is there a way to tell btcrecover that front part is the same as end part ? That will lower the combinations and ETA significantly.
Also is there a way to create an exclusion list with btcrecover to skip combinations that I already tried
?
I can use --listpass and save them to a file so the next time I tried those combinations will be skipped If that's even possible.
Thank you