02-14-2019, 10:34 AM
(02-14-2019, 12:07 AM)suhel1986 Wrote: Sorry mate I am not so good at this one, now I got following error,
I guessed if the password was 10 to 15 char long I used following command and I got this error
Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?
C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?
You are trying 10 to 15 char, that is waaaaaayyyyyyyyy too long. You are never gonna get that.
A length of 10 generates a total of 95 (characters in ?a) to the power of 10 possibilities. In total 59873693923837890625 passwords. At your speed of 1115 H/s that will take 1702764467 years.
You can't brute force a Bitcoin Wallet Passphrase letter for letter. You need to use https://hashcat.net/wiki/doku.php?id=dictionary_attack which combines your words in the Passphrase. Only problem there is you need a wordlist which has all the words in the passphrase and isn't too long. otherwise you will run in to the same problem.