Pages:
Author

Topic: Bounty 10000$ Who can help me recall password! - page 2. (Read 651 times)

member
Activity: 313
Merit: 30
but what we really have here? you're talkin that someone lost the password from 7k bucks wallet. Then he told second guy that first symbols are c a and gave him this wallet.and this second guy has -2 trust already . idk what else to say
legendary
Activity: 952
Merit: 1367
I think you have enough passwords. Do not have hope that someone else used the same. In my opinion you should launch a hybrid attack. Think what you would like to append (or prepend) to existing password and prepare the correct mask.
https://hashcat.net/wiki/doku.php?id=hybrid_attack
https://hashcat.net/wiki/doku.php?id=rule_based_attack
copper member
Activity: 419
Merit: 29
Quote
10 chars passwords are huge for brute force, I try with crunch without symbols and we are talking about a 2 PB file:

Thanks for your research. Indeed, we do not deal with the brute force method for guessing a password.
We know the first 2 letters are "Ca" and therefore we extract all passwords with a length of 10 or more characters from dictionaries already available on the network.

For example password is: Ca******** = 10 characters and more... Only by such a template you need to extract passwords from dictionaries.

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" & "PawGo" - Can you create another dictionary from this list? https://weakpass.com/wordlist
legendary
Activity: 2982
Merit: 2681
Top Crypto Casino
...
Let's go to finding all passwords, contains 10 and 10+ symbols please...
...

10 chars passwords are huge for brute force, I try with crunch without symbols and we are talking about a 2 PB file:

Code:
bitcoin@forum:~$ crunch 10 10 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@@@@@
Crunch will now generate the following amount of data: 2401741161433856 bytes
2290478860 MB
2236795 GB
2184 TB
2 PB
Crunch will now generate the following number of lines: 218340105584896

Another good option could be to run crunch direct in the cracking command with HashCat. That way you generate the passwords at the moment without loading them from a huge file.

This article explains how to do that:

https://saketupadhyay.medium.com/pipe-brute-force-attack-via-password-generator-2dcaab91e88e
copper member
Activity: 419
Merit: 29
I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
https://easyupload.io/ognas8
[/quote]

That's great, you're in the $10,000 race too...

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca1openwall.txt
* Passwords.: 1697
* Bytes.....: 17001
* Keyspace..: 1697
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$****************************************
Time.Started.....: Fri Apr 01 12:43:11 2022 (2 mins, 10 secs)
Time.Estimated...: Fri Apr 01 12:45:21 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca1openwall.txt)
Guess.Queue......: 1/4 (25.00%)
Speed.#1.........:       13 H/s (0.34ms) @ Accel:1024 Loops:32 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1697/1697 (100.00%)
Rejected.........: 0/1697 (0.00%)
Restore.Point....: 1697/1697 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cayce -> Cazzie
Hardware.Mon.#1..: Temp: 43c Fan: 46% Util: 74% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca2openwall.txt
* Passwords.: 3754
* Bytes.....: 41038
* Keyspace..: 3754
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*******************************************
Time.Started.....: Fri Apr 01 12:45:21 2022 (2 mins, 41 secs)
Time.Estimated...: Fri Apr 01 12:48:02 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca2openwall.txt)
Guess.Queue......: 2/4 (50.00%)
Speed.#1.........:       23 H/s (0.17ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 3754/3754 (100.00%)
Rejected.........: 0/3754 (0.00%)
Restore.Point....: 3754/3754 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Causeries du Lundi -> Cazzie
Hardware.Mon.#1..: Temp: 41c Fan: 46% Util: 63% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca3Rocktastic12a.txt
* Passwords.: 4236653
* Bytes.....: 51778356
* Keyspace..: 4236653
* Runtime...: 1 sec

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$**************************************
Time.Started.....: Fri Apr 01 12:48:03 2022 (45 mins, 32 secs)
Time.Estimated...: Fri Apr 01 13:33:35 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca3Rocktastic12a.txt)
Guess.Queue......: 3/4 (75.00%)
Speed.#1.........:     1551 H/s (0.16ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 4236653/4236653 (100.00%)
Rejected.........: 0/4236653 (0.00%)
Restore.Point....: 4236653/4236653 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cazzyy@3 -> Cardiff2025!
Hardware.Mon.#1..: Temp: 41c Fan: 45% Util: 62% Core:1199MHz Mem:6794MHz Bus:16

Dictionary cache built:
* Filename..: f:\hashcat\wallet\Ca\Ca4weakpass3w.txt
* Passwords.: 1227107
* Bytes.....: 14385707
* Keyspace..: 1227107
* Runtime...: 0 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$***************************************
Time.Started.....: Fri Apr 01 13:33:35 2022 (13 mins, 34 secs)
Time.Estimated...: Fri Apr 01 13:47:09 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\Ca\Ca4weakpass3w.txt)
Guess.Queue......: 4/4 (100.00%)
Speed.#1.........:     1507 H/s (0.17ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 1227107/1227107 (100.00%)
Rejected.........: 0/1227107 (0.00%)
Restore.Point....: 1227107/1227107 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: Cazzones -> Cazzzzoduro1000
Hardware.Mon.#1..: Temp: 42c Fan: 46% Util: 60% Core:1199MHz Mem:6794MHz Bus:16


Let's go to finding all passwords, contains 10 and 10+ symbols please...

Please use any archiver
ARJ
ZIP
7zip

and servers for temporary and free files storage.
legendary
Activity: 952
Merit: 1367
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

A great tool that I recommend is Crunch:

As example with that command, we can generate al the combinations for the 5 Chars password including Caps and Numbers.


OK, but why?
As he is using hashcat, he may use masks which do the same inside program.
He may also configure mixed mode, where each word from the list could be internally modified, something may be appended etc. And honestly speaking I think he should use this, as relying on pure words list could be not enough.

The only advantage of using crunch I see, is that having precalculated passwords you may externally control the work done, otherwise you must rely on checkpoints saved by hashcat.,
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
Shouldn't it be:
Code:
 grep '^Ca.*$'
I used this:
Code:
grep "^Ca"
legendary
Activity: 952
Merit: 1367

2.-We read all the files and send all the passwords that start with 'Ca' to a new file:

Code:
cat *.txt | grep '^Ca*' >> my_dic.txt


Shouldn't it be:
Code:
 grep '^Ca.*$'
?
Your regex in grep returned all lines starting with "C", second character was not limited to 'a'.

I have prepared 4 files for you: 2 based on openwall, 1 from rocktastic12a and 1 from weakpass3w:
https://easyupload.io/ognas8
copper member
Activity: 419
Merit: 29
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist[/quote]
Which one? Give me the Torrent links you want, there are far too many files there for me to check all of them.

...
Also I try HASH attack by MASK
for example: Ca******
as can you see all 8 symbols passwords we check (BruteForce) and no results...

Let's go to finding all passwords, contains 10 and 10+ symbols please...

Please use any archiver
ARJ
ZIP
7zip
and servers for temporary and free files storage.
copper member
Activity: 419
Merit: 29
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

...
I don’t know the password and I don’t have a list, I only know that the first 2 letters are “Ca”
and I don’t even know if this is one word or several identical words or is it a phrase written without space characters and so on.
So my hope is that someone stole this password from some server or somewhere else since 2015 when the wallet was encrypted in early March.

When trying to encrypt a wallet for the first time, you may see a recommendation on the screen that
the password must be 10 characters long or a few words long.


Therefore, we cannot hope and use the brute force method, there are no such resources on the planet yet,
but we can hope that the password was once stolen and a match will be found.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
Which one? Give me the Torrent links you want, there are far too many files there for me to check all of them.

Code:
:~$ crunch 6 6 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@
Nice one! I made them in different lengths:
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/5.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/6.txt
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/7.txt (still uploading, I can't install crunch on this server)
http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/8.txt (476 GB, I'm creating the file on one server and saving it to this location. At the rate it's going it'll take at least half a day to complete. Chances are something will break before it's done) Update: After 235 GB, it exceeded it's disk quota. This server will be wiped in 5 days.
legendary
Activity: 2982
Merit: 2681
Top Crypto Casino
I think it would be better if you generate the password list, that way you can verify all the possible passwords.

A great tool that I recommend is Crunch:

Code:
:~$ crunch 5 5 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@
Crunch will now generate the following amount of data: 1429968 bytes
1 MB
0 GB
0 TB
0 PB
Crunch will now generate the following number of lines: 238328

As example with that command, we can generate al the combinations for the 5 Chars password including Caps and Numbers.

If we want to generate a dictionary for 6 chars then we should use:

 
Code:
:~$ crunch 6 6 ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789abcdefghijklmnopqrstuvwxyz -t Ca@@@@

I hope this helps:

https://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/
copper member
Activity: 419
Merit: 29
I have no idea what that is, and I don't have any use for it. I also don't install unknown software. If you can convert it to a low fee common altcoin or BTC-LN I'll accept it.

The transfer of any coins from the exchange is very expensive, a very large commission.
I offered BitcoinHD coins or I also have Litecoin Cash (they are stored on QT wallets).
Of course, these are probably shitty coins, but I believe that they will rise in value.

Dictionary cache built:
* Filename..: f:\hashcat\wallet\allinone.txt
* Passwords.: 41399595
* Bytes.....: 524143144
* Keyspace..: 41399592
* Runtime...: 3 secs

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*******************************************
Time.Started.....: Thu Mar 31 10:54:16 2022 (3 hours, 56 mins)
Time.Estimated...: Thu Mar 31 14:50:47 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\allinone.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     2917 H/s (0.25ms) @ Accel:256 Loops:16 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 41399592/41399592 (100.00%)
Rejected.........: 0/41399592 (0.00%)
Restore.Point....: 41399592/41399592 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: CaZZy06 -> Caш╝ЭчЯ│
Hardware.Mon.#1..: Temp: 60c Fan: 62% Util: 73% Core:1886MHz Mem:6794MHz Bus:16

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
Doesn't "Google drive" provide space for free?
I think it's 15 GB, that's no use Tongue

create a list of all the .torrent files you want me to download.
copper member
Activity: 419
Merit: 29
Update: I'm currently extracting the 153 GB I've downloaded already. I'm (ab)using all CPU cores, but the Seedbox is still quite empty so I hope they won't kick me off. I'll post the links when done.

ThankYou! LoyceV
Doesn't "Google drive" provide space for free?
I've decided to reward you with 50 BitcoinHD (BHD) just for helping me, tell me your wallet address.
https://github.com/btchd/btchd/releases

If successful our password story, I will transfer you additionally $10,000 (USDT TRC-20)
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
Which one? How about you create a list of all the .torrent files you want me to download. My Seedbox expires in a few days, so don't wait too long as I don't want to download those huge files elsewhere.
Update: I'm currently extracting the 153 GB I've downloaded already. I'm (ab)using all CPU cores, but the Seedbox is still quite empty so I hope they won't kick me off. I'll post the links when done.

Currently extracting:
Code:
cyclone.hashesorg.hashkiller.combined.txt.7z
dicassassin.7z
dictionary_private.dic.7z
hashesorg2019.gz
Hashes.org.7z
HashesOrg.gz
hashkiller-dict.txt.7z
rockyou2021.7z
weakpass_1.gz
weakpass_2a.gz
weakpass_2.gz
weakpass_3.7z
weakpass_3p.7z
xsukax-Wordlist-All.7z

Update
See: http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu/ for the files.

There's a total of 99,601,845 passwords in there. I've added allinone.txt: it doesn't include duplicates and is reduced to 41,399,595 passwords.
copper member
Activity: 419
Merit: 29
Are you sure "ca" should be excluded: only Ca?

- Yes, I'm sure. All "ca" passwords must be rename as "Ca"

Thanks!

Let start checking with your special dictionary now!

I will post here Hashcat log data results:

Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 11300 (Bitcoin/Litecoin wallet.dat)
Hash.Target......: $bitcoin$64$*****************************************
Time.Started.....: Tue Mar 29 23:14:23 2022 (2 hours, 48 mins)
Time.Estimated...: Wed Mar 30 02:03:21 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (f:\hashcat\wallet\weakpass_3a_Ca_walletrecovery.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     1862 H/s (0.19ms) @ Accel:1024 Loops:16 Thr:32 Vec:1
Recovered........: 0/1 (0.00%) Digests
Progress.........: 18872859/18872859 (100.00%)
Rejected.........: 0/18872859 (0.00%)
Restore.Point....: 18872859/18872859 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: CaZZy2206 -> Caя┐╜я┐╜vamos
Hardware.Mon.#1..: Temp: 41c Fan: 45% Util: 67% Core:1199MHz Mem:6794MHz Bus:16

Let's try other dictionaries, these passwords are not suitable.

"LoyceV" - Can you create another dictionary from this list? https://weakpass.com/wordlist
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
We only need dictionaries that are made up of human-made passwords.
Is it on that site? Do you have a direct (torrent) link to the one you want?
I'm currently extracting anything starting with "Ca" from weakpass_3a.7z (it takes a very long time to extract). Are you sure "ca" should be excluded: only Ca?

Try this: http://le6-1-93ghostman.pulsedmedia.com/public-loyceclu//weakpass_3a_Ca_walletrecovery.txt (219 MB, 18872862 passwords).
copper member
Activity: 419
Merit: 29
Thanks, but I don't have Linux, I have Windows only.
I'm currently downloading all Torrents on the first page of https://weakpass.com/wordlist, but before I continue: which file do you want me to get "Ca" from?

If there is the largest dictionary that takes more than 100 or 200 gigabytes, then there are probably many passwords inside it, in which the first 2 letters are "Ca". But at the same time, I know for sure that the password was not generated by a robot, the password was invented by a person, and we need passwords that were invented by people. We only need dictionaries that are made up of human-made passwords.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
Thanks, but I don't have Linux, I have Windows only.
I'm currently downloading all Torrents on the first page of https://weakpass.com/wordlist, but before I continue: which file do you want me to get "Ca" from?
Pages:
Jump to: