The reply that RedGrittyBrick gave is basically proper, although fallacious on the edges.
For instance, there have been no password / passphrase complexity necessities for early Bitcoin core wallets. So, it could be completely legitimate to assign the password “42” to your pockets. (I feel that is nonetheless true in present variations of Bitcoin core).
It is sensible to brute drive a brief password to a pockets.dat file fairly rapidly. (By brute drive, I imply strive each doable mixture of characters).
Testing each mixture as much as 4 characters on a mid-sized server with a few 3080 GPUs takes lower than 10 minutes; 5 characters takes lower than a day; 6 characters takes about 2 months, and the period of time it takes skyrockets from there.
There are additionally different strategies that contain testing widespread leaked passwords towards wallets.
However, most respectable crypto asset restoration corporations would require that you’ve got some concept of what your password might be. In any other case, the danger will increase that this is not really your pockets — that it was stolen, cast, or in any other case bought on-line.
You could find respectable restoration corporations. I will not point out them by identify, however simply guarantee that they have been in enterprise for just a few years, that their founders are public about who they’re, and that they have been profiled by respected publications.