Provenance of the wallet.dat file notwithstanding...
Given the supplied password... the following "mask file" will try checking for basic typo's on each character first (including SHIFT
not held properly when typing UPPERCASE/symbol, or SHIFT accidentally held when trying to type lowercase/number). Then it will test each position, one at a time, and try ANY possible character in that position.
NOTE: if there is more than one character incorrect, this will NOT work.?s?d,?1#5cltEkfy/5z
?s?d,~?15cltEkfy/5z
?d?s,~#?1cltEkfy/5z
?l?u,~#5?1ltEkfy/5z
?l?u,~#5c?1tEkfy/5z
?l?u,~#5cl?1Ekfy/5z
?l?u,~#5clt?1kfy/5z
?l?u,~#5cltE?1fy/5z
?l?u,~#5cltEk?1y/5z
?l?u,~#5cltEkf?1/5z
?s?d,~#5cltEkfy?15z
?d?s,~#5cltEkfy/?1z
?l?u,~#5cltEkfy/5?1
?a#5cltEkfy/5z
~?a5cltEkfy/5z
~#?acltEkfy/5z
~#5?altEkfy/5z
~#5c?atEkfy/5z
~#5cl?aEkfy/5z
~#5clt?akfy/5z
~#5cltE?afy/5z
~#5cltEk?ay/5z
~#5cltEkf?a/5z
~#5cltEkfy?a5z
~#5cltEkfy/?az
~#5cltEkfy/5?a
Create a new file where hashcat.exe is... call it "test.hcmask"... copy/paste the above masks into it and save it.
The hashcat commandline should be:
hashcat.exe -m 11300 -a 3 $bitcoin$96$**** test.hcmask
NOTE: replace $bitcoin$96$**** with your actual wallet.dat hash extracted using bitcoin2john.py
Hashcat will then run through all the 1 character possibilities. If it doesn't work then, as noted above, there is more than one character that is incorrect...
