07:30:31 would anyone know how to extract a hash from FEATHER wallet .keys file? 07:30:32 lost a good amount - and don't have the seed (i accidentally deleted text file i stored all my info in) 07:30:34 i have the keys file. so technically, if i can somehow figure out the password i could still access the funds. 07:30:36 however, the password is 20+ character, random characters, letters, numbers. 07:30:38 was thinking of trying to use HASHCAT to brute force it. 08:53:28 the keys there are derived via Cryptonight V0 08:54:14 I don't think you would get there with 20+ characters 10:06:59 probably not, heh. 10:07:00 ...but maybe good to keep the long game in mind on this one. 10:07:02 any idea on how to extract it? 10:07:22 probably not, heh. 10:07:24 my expectations are low. 10:07:26 ...but maybe good to keep the long game in mind on this one. 10:07:28 any idea on how to extract it? 11:02:15 IMO you probably need a custom-written program for brute-forcing it. First, the encryption algorithm of the file is proprietary, and the check "Success, this is the correct password" is also highly specific - you would need to check for some characteristic bytes that a Monero wallet file *in particular* has to decide whether decryption succeeded. And as DataHoarder already said, w 11:02:16 ith a fully random 20 character password probably forget it, for runtime alone. 11:03:18 yeah. I implemented the decryption/check and it also depends on ... version it was created 11:04:50 I mean, frankly, we want to be it almost impossible, right? 11:06:00 If anybody can just lift off Monero wallet files with a trojan and then sprinkle a bit of HASHCAT over it to open, that would be in dire need of improvement. 11:07:23 should use RandomX for derivation nowadays :) 11:07:40 there are Cryptonight ASIC after all 11:07:42 specially V0 11:09:02 "and don't have the seed (i accidentally deleted text file i stored all my info in)" 11:09:18 don't wallets tell you to write down your seed on a piece of paper :P 11:09:37 i mean the official program really tries to make you write down your seed 11:21:55 figured as much. this happened a while ago so every once in a while i check in on new possibilities of maybe one day being able to unlock it. 11:21:56 recent recommendation was attempting with something like Haschat, 11:21:58 but also continuously imagining something custom to give it a shot with. 11:22:00 as tech evolves, maybe one day it could be possible. 11:22:20 older version, probably mid/late 2023ish. 11:26:17 never_ever_quit: if it's just uppercase and lowercase and numbers 11:26:28 the number of possibilities would be 62 ^ 20 11:26:28 nah, that actually would've been safer, haha. 11:26:28 was working w/ encrypted textfile in sandboxed environment. 11:26:30 had just done some wallet consolidating, 11:26:32 created new wallet/seed for storage of the funds, wrote fresh seed/pw in a new file. 11:26:34 boom. txt file was obliterated accidentally when my laptop ran out of bat and hadn't saved it. 11:26:36 usually always have backups otherwise. 11:26:38 big mistake. 11:26:58 62 ^ 20 = 704,423,425,546,998,022,968,330,264,616,370,176 11:27:22 number of possiblities 11:27:50 if it's really fully random, then it would be much much higher than that 11:28:52 yeah, was a mix of everything. 11:28:52 uppercase/lowercase letters, numbers, special characters etc. heh 11:30:34 the only thing i could maybe provide is a rendition of the 'style/gesture' of my key presses. 11:30:34 i notice that many of the pw's i would make for wallets around that time (which there were many), would share some similarities. 11:30:36 buy beyond that, nothing really. no keywords for potential bruteforce. 11:30:38 maybe one to save for a quantum era. 11:30:43 well, yeah you're fucked 11:30:54 nah quantum is only good for key exchanges 11:31:16 quantum can factorize very large numbers easily 11:31:21 but it cannot bruteforce a password 11:31:35 infact, it'd be much slower than a traditional computer at that task 11:56:47 there's several pw i created from that era that have similar starting 3-4 characters. 11:56:48 would chances increase enough to make it worth a try if I was able to piece together a string of sequential characters? 11:56:50 no guarantee that this one had exact same structure, 11:56:52 but there is small possibility and amount is sizeable enough that i'd like to exhaust any options. 16:06:19 .merges 16:06:19 -xmr-pr- 10166 10212 16:10:23 done 18:56:57 will monero-oxide ever have functions to generate wallets? 18:59:11 #cuprate better place 4 rust qs imo 18:59:30 on IRC? 19:02:28 I think so 19:42:01 yes, it's bridged 19:43:54 i'm just reading monero's source code to figure out how to generate a wallet 19:44:10 i really wish i remembered what DataHoarder said 19:48:10 Cindy, what project are you working on? 19:49:37 a XMR gift wallet generator, it'll generate a wallet, listen for transactions, and then generate a PDF document (after the user stops it) 19:51:19 old and offline version for reference @ https://github.com/xmrdotgift/xmrdotgift.github.io 19:51:21 And you don't want to use `monero-wallet-rpc`? 19:51:38 no because that'd involve running a seperate program 19:51:47 ideally i'd want everything to be self-contained 19:53:02 So you want monero-oxide to generate a pdf? 19:53:12 no 19:53:46 i already generate a PDF myself (through 300 lines of manually writing PDF opcodes) 19:54:20 manually writing 300 lines of PDF opcodes* 19:54:27 so 19:54:44 Whats wrong with wallet-rpc 19:55:10 it's because i have to run it as a seperate process and possibly deal with it wanting to store files seperately 19:55:15 and other stuff it might want 19:56:07 This is good. Cindy can encounter all the `monero-oxide` sharp edges first so the rest of us don't have to. 19:56:31 true that :P 19:56:50 or i could run a WASM interpreter 19:56:57 with monero-wallet-rpc compiled to webassembly 19:59:02 i just don't really want to manage a completely seperate program running at the same time 20:27:04 Cindy: making wallet, you mean making the key material? 20:27:33 DataHoarder: yes 20:27:45 then that's just edwards25519 operations plus secure rng 20:27:46 deriving 2 private keys from a seed 20:27:55 i see 20:28:01 20:44:10 i really wish i remembered what DataHoarder said 20:28:02 i thought it was super complicated like uhh 20:28:03 it's in libera logs. I mentioned the ways you could do this :) 20:28:07 monero-oxide ofc also has similar things 20:28:08 biased hash to point or something 20:28:33 well. you'd use monero-oxide or mine which implement the underlying. 20:28:55 do you have documentation on how the algorithm works? 20:29:11 i can't find anything about how the wallet generation currently works, and i don't wanna dig into monero's messy code 20:29:21 example "NewCarrotSpendWalletFromMasterSecret" https://git.gammaspectra.live/P2Pool/consensus/src/branch/master/monero/address/wallet/spend.go#L94 20:29:34 move this to #monero-community-dev 20:29:37 #monero-dev is for monero C itself 20:30:14 fair