Password wallet recovery wasabi
#1
Hello Everyone

Here more information related to my issue:
https://www.reddit.com/r/WasabiWallet/co..._password/

I really need help getting access in the wallet back what I had created.

I can provide you the .json wallet file and you can have a try.

There is all my money into it. 400 EURO. You can have a slide % of it.

CONTACT ME TROUGH HERE OR EMAIL: pauppaulraw@gmail.com


Thank you very much.

Greetings,
Paul
Reply
#2
Wasabi don't use captcha or something when testing the password.

So your program can easy brute force it with the right resources..
Reply
#3
Please do not misquote me, I got a PM from you and I replied by saying that hashcat doesn't currently support Wasabi Wallet recovery. I'm not sure about the algorithm details, I/somebody would need to research/study the source code etc. I only found this:
https://github.com/nopara73/WasabiEncryptedSecretTester

... and I've linked that to you to see if it would work with your .json file or a newly generated wallet file for which you have the password.
Reply
#4
(03-29-2020, 12:50 PM)philsmd Wrote: Please do not misquote me, I got a PM from you and I replied by saying that hashcat doesn't currently support Wasabi Wallet recovery. I'm not sure about the algorithm details, I/somebody would need to research/study the source code etc. I only found this:
https://github.com/nopara73/WasabiEncryptedSecretTester

... and I've linked that to you to see if it would work with your .json file or a newly generated wallet file for which you have the password.

Yeah. I saw your PM. Thanks for your attention. But I need more hope. Why would I generate a new wallet file?

I need the password of my old wallet file created 2 months ago.. the bitcoins are on there
Reply
#5
(03-29-2020, 12:50 PM)philsmd Wrote: Please do not misquote me, I got a PM from you and I replied by saying that hashcat doesn't currently support Wasabi Wallet recovery. I'm not sure about the algorithm details, I/somebody would need to research/study the source code etc. I only found this:
https://github.com/nopara73/WasabiEncryptedSecretTester

... and I've linked that to you to see if it would work with your .json file or a newly generated wallet file for which you have the password.

You send me two more PM.. lemme read that. brb
Reply
#6
Every serious attempt to crack a hash should be accompanied with testing a real-world example.

That means in very easy terms: please first verify if you are able to crack an example for which you have the password before attempting to crack the target "hash" (otherwise you are just going to waste your time if you are doing something wrong, e.g. not using the correct parameters/input etc)
Reply
#7
(03-29-2020, 01:19 PM)philsmd Wrote: Every serious attempt to crack a hash should be accompanied with testing a real-world example.

That means in very easy terms: please first verify if you are able to crack an example for which you have the password before attempting to crack the target "hash" (otherwise you are just going to waste your time if you are doing something wrong, e.g. not using the correct parameters/input etc)

I wrote you a new PM with the following important information to save allot of time:

I can tell you that my password could have these numbers and the following symbols

(Word)123 ! @

- First letter of the word is a capital letter
- (maybe a 4 or 3 as L33T language inside the word )
- The number 123 at the end of the word before the symbols
- One of the two symbols are in the password at the very end of it after the numbers

I can send you the wallet .json file with EncryptedSecret inside and my 12 word SEED 
Reply
#8
unfortunately, I am not interested in trying to crack your wallet/hash. If you really have don't want to investigate the time to test with the tool above or research the algorithm and create a github issue with the technical details etc.. there is little we can do here...

There might be other services that could help you (this forum and the developers of hashcat try to not get involved into - some very shady - cracking requests etc). It's actually forbidden to ask for cracks in this forum... Two things I could suggest is trying to use the hashkiller forum at https://forum.hashkiller.io/index.php or to use some more serious wallet recovery services like dave crypto's wallet recovery service (but again, I have no experience with those, you should be very careful and don't trust anybody with your funds... because people in this scene might try to scam you !)
Reply
#9
(03-29-2020, 01:35 PM)philsmd Wrote: unfortunately, I am not interested in trying to crack your wallet/hash. If you really have don't want to investigate the time to test with the tool above or research the algorithm and create a github issue with the technical details etc.. there is little we can do here...

There might be other services that could help you (this forum and the developers of hashcat try to not get involved into - some very shady - cracking requests etc). It's actually forbidden to ask for cracks in this forum... Two things I could suggest is trying to use the hashkiller forum at https://forum.hashkiller.io/index.php or to use some more serious wallet recovery services like https://twitter.com/davecrypto (but again, I have no experience with those, you should be very careful and don't trust anybody with your funds... because people in this scene might try to scam you !)

Okay, Thank you for your information again. I hope that ATOM can help me if he could reply on here.

It is my wallet 100% sure.

I also got the 12 seed words

I will try to contact some people who advised me. I don't trust them more than I trust you and Atom
Reply
#10
We don't crack hashes here. Same for atom.
Your wallet may uses Scrypt, which is slow as hell.
Note that if you give your 12 words + password, one can get the master private key, and steal your funds.
Reply