-
m-relay_<never_ever_quit:matrix.org> would anyone know how to extract a hash from FEATHER wallet .keys file?
-
m-relay_<never_ever_quit:matrix.org> lost a good amount - and don't have the seed (i accidentally deleted text file i stored all my info in)
-
m-relay_<never_ever_quit:matrix.org> i have the keys file. so technically, if i can somehow figure out the password i could still access the funds.
-
m-relay_<never_ever_quit:matrix.org> however, the password is 20+ character, random characters, letters, numbers.
-
m-relay_<never_ever_quit:matrix.org> was thinking of trying to use HASHCAT to brute force it.
-
DataHoarderthe keys there are derived via Cryptonight V0
-
DataHoarderI don't think you would get there with 20+ characters
-
m-relay_<never_ever_quit:matrix.org> probably not, heh.
-
m-relay_<never_ever_quit:matrix.org> ...but maybe good to keep the long game in mind on this one.
-
m-relay_<never_ever_quit:matrix.org> any idea on how to extract it?
-
m-relay_<never_ever_quit:matrix.org> probably not, heh.
-
m-relay_<never_ever_quit:matrix.org> my expectations are low.
-
m-relay_<never_ever_quit:matrix.org> ...but maybe good to keep the long game in mind on this one.
-
m-relay_<never_ever_quit:matrix.org> any idea on how to extract it?
-
m-relay_<rbrunner7:monero.social> IMO you probably need a custom-written program for brute-forcing it. First, the encryption algorithm of the file is proprietary, and the check "Success, this is the correct password" is also highly specific - you would need to check for some characteristic bytes that a Monero wallet file *in particular* has to decide whether decryption succeeded. And as DataHoarder already said, w<clipped message>
-
m-relay_<rbrunner7:monero.social> ith a fully random 20 character password probably forget it, for runtime alone.
-
DataHoarderyeah. I implemented the decryption/check and it also depends on ... version it was created
-
m-relay_<rbrunner7:monero.social> I mean, frankly, we want to be it almost impossible, right?
-
m-relay_<rbrunner7:monero.social> If anybody can just lift off Monero wallet files with a trojan and then sprinkle a bit of HASHCAT over it to open, that would be in dire need of improvement.
-
DataHoardershould use RandomX for derivation nowadays :)
-
DataHoarderthere are Cryptonight ASIC after all
-
DataHoarderspecially V0
-
Cindy"and don't have the seed (i accidentally deleted text file i stored all my info in)"
-
Cindydon't wallets tell you to write down your seed on a piece of paper :P
-
Cindyi mean the official program really tries to make you write down your seed
-
m-relay_<never_ever_quit:matrix.org> figured as much. this happened a while ago so every once in a while i check in on new possibilities of maybe one day being able to unlock it.
-
m-relay_<never_ever_quit:matrix.org> recent recommendation was attempting with something like Haschat,
-
m-relay_<never_ever_quit:matrix.org> but also continuously imagining something custom to give it a shot with.
-
m-relay_<never_ever_quit:matrix.org> as tech evolves, maybe one day it could be possible.
-
m-relay_<never_ever_quit:matrix.org> older version, probably mid/late 2023ish.
-
Cindynever_ever_quit: if it's just uppercase and lowercase and numbers
-
Cindythe number of possibilities would be 62 ^ 20
-
m-relay_<never_ever_quit:matrix.org> nah, that actually would've been safer, haha.
-
m-relay_<never_ever_quit:matrix.org> was working w/ encrypted textfile in sandboxed environment.
-
m-relay_<never_ever_quit:matrix.org> had just done some wallet consolidating,
-
m-relay_<never_ever_quit:matrix.org> created new wallet/seed for storage of the funds, wrote fresh seed/pw in a new file.
-
m-relay_<never_ever_quit:matrix.org> boom. txt file was obliterated accidentally when my laptop ran out of bat and hadn't saved it.
-
m-relay_<never_ever_quit:matrix.org> usually always have backups otherwise.
-
m-relay_<never_ever_quit:matrix.org> big mistake.
-
Cindy62 ^ 20 = 704,423,425,546,998,022,968,330,264,616,370,176
-
Cindynumber of possiblities
-
Cindyif it's really fully random, then it would be much much higher than that
-
m-relay_<never_ever_quit:matrix.org> yeah, was a mix of everything.
-
m-relay_<never_ever_quit:matrix.org> uppercase/lowercase letters, numbers, special characters etc. heh
-
m-relay_<never_ever_quit:matrix.org> the only thing i could maybe provide is a rendition of the 'style/gesture' of my key presses.
-
m-relay_<never_ever_quit:matrix.org> i notice that many of the pw's i would make for wallets around that time (which there were many), would share some similarities.
-
m-relay_<never_ever_quit:matrix.org> buy beyond that, nothing really. no keywords for potential bruteforce.
-
m-relay_<never_ever_quit:matrix.org> maybe one to save for a quantum era.
-
Cindywell, yeah you're fucked
-
Cindynah quantum is only good for key exchanges
-
Cindyquantum can factorize very large numbers easily
-
Cindybut it cannot bruteforce a password
-
Cindyinfact, it'd be much slower than a traditional computer at that task
-
m-relay_<never_ever_quit:matrix.org> there's several pw i created from that era that have similar starting 3-4 characters.
-
m-relay_<never_ever_quit:matrix.org> would chances increase enough to make it worth a try if I was able to piece together a string of sequential characters?
-
m-relay_<never_ever_quit:matrix.org> no guarantee that this one had exact same structure,
-
m-relay_<never_ever_quit:matrix.org> but there is small possibility and amount is sizeable enough that i'd like to exhaust any options.
-
tobtoht.merges
-
xmr-pr10166 10212
-
tobtohtdone
5 minutes ago