Bitcoin Forum

Bitcoin => Bitcoin Discussion => Topic started by: bitpump on August 08, 2015, 05:29:17 AM



Title: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: bitpump on August 08, 2015, 05:29:17 AM
"Why I'm releasing a brainwallet cracker at DEFCON 23"
https://rya.nc/defcon-brainwallets.html
https://twitter.com/ryancdotorg

The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552

Slideshow
https://rya.nc/cracking_cryptocurrency_brainwallets.pdf

Software
https://github.com/ryancdotorg/brainflayer

More details on this topic:
https://www.reddit.com/r/Bitcoin/comments/3g7bpa/brainwallet_shut_down_permanently_due_to/


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: electerium on August 08, 2015, 05:45:20 AM
this is actually like unbelievably horrible, and troublesome.

I remember when i first read about brainwallet on reddit I thought: that's like really scary, but cute, a lot of people will fall for using it.


It never occurred to me that not only could people end up with the same passphrase, but that you could actively scan the entire blockchain and just start brute forcing for brain wallets with easily gussed passphrases.


What's most concerning are that there are people who are ALREADY running botnets on the blockchain, and today any 5 char passphrase gets auto extracted in seconds.


most poignant:

"Brainwallets make the Blockchain a
public password hash database"


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: AgentofCoin on August 08, 2015, 05:47:26 AM
...
The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552
...

It is surprising to me that people who are knowledgeable enough about Bitcoin/bitcoin to know what a brainwallet is,
don't choose more complex phrases, especially when their bitcoins are at higher risk of theft, compared to a standard privatekey.
The "how much wood could a woodchuck..." saying or whatever it is considered could be chosen by tens of people, in theory.
With millions of users in the future, that one would pop up hundredths of times.

Good luck with your presentation.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: electerium on August 08, 2015, 05:54:13 AM
people whove used brainwallet should sha256 their passphrase immediately and move the coins to something more secure.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: LiteCoinGuy on August 08, 2015, 06:08:59 AM
alot of smart people recommended that you should not use a brainwallet.

thanks to the reseacher. actually he is a whitehat  :)


@AgentofCoin

that is truly a bad brainwallet  ::)


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: findftp on August 08, 2015, 11:51:00 AM
people whove used brainwallet should sha256 their passphrase immediately and move the coins to something more secure.

Uhm, you're joking right?


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: cellard on August 08, 2015, 12:35:23 PM
Damn, how I didn't think about that one? there's probably a lot of money being held with simple ass phrases like that, people just don't take their security seriously enough. Hopefully with time they will learn.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: CelestialWalrus on August 08, 2015, 12:38:00 PM
The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"

I've tried guessing some of them, but this one is just... wow. I've never found anything actually.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Kazimir on August 08, 2015, 12:38:15 PM
I have a LOT of bitcoins stored in brainwallets, and I feel perfectly safe about it.

I think brainwallets are very secure, provided that you REALLY understand what makes strong input for a brainwallet, and what doesn't.

For example, I use Sha2562(master key + passphrase) where "master key" is a long, complex, impossible to guess password that I also use for e.g. Keepass. And the passphrase (it's actually a phrase, not a word) is something I can remember easily, but is still kinda hard to guess. Together, I feel very confident that nobody on earth is ever going to guess or brute force it.

With Sha2562 I mean something similar to Sha256d (double Sha256) which Bitcoin uses, but instead of Sha256(Sha256(x)), I use Sha256(x+Sha256(x)).


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: jonald_fyookball on August 08, 2015, 04:14:48 PM
I have a LOT of bitcoins stored in brainwallets, and I feel perfectly safe about it.

I think brainwallets are very secure, provided that you REALLY understand what makes strong input for a brainwallet, and what doesn't.

For example, I use Sha2562(master key + passphrase) where "master key" is a long, complex, impossible to guess password that I also use for e.g. Keepass. And the passphrase (it's actually a phrase, not a word) is something I can remember easily, but is still kinda hard to guess. Together, I feel very confident that nobody on earth is ever going to guess or brute force it.

With Sha2562 I mean something similar to Sha256d (double Sha256) which Bitcoin uses, but instead of Sha256(Sha256(x)), I use Sha256(x+Sha256(x)).

Yes.  However, it seems most people don't REALLY understand that.  It seems simple and obvious to
an informed person, but it is not to the layperson, even when explained.

In another thread, we were discussing probabilities and someone remarked "I don't understand all this fancy math"
when there was no math involved except multiplication and perhaps exponentiation.

When you're smart/informed/talent, its easy to overestimate the abilities of others.  So,
I get why brainwallets aren't recommended and even in your situation, the entropy can
only be estimated but not measured directly.

I just use electrum although I do believe in theory that you're right.  If you truly know
what you're doing, you can create a strong brain wallet.



Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Mickeyb on August 08, 2015, 09:35:48 PM
people whove used brainwallet should sha256 their passphrase immediately and move the coins to something more secure.

Come on man, people who know how to choose good passwords and store them correctly while using brainwallets are as safe as using other "normal" wallets. I have seen so many stupid missuses with the wallet.dat files so far that are as bad as bad brainwallet passwords.

This means nothing, if people are using brainwallets, they are not less safe automatically.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: EternalWingsofGod on August 08, 2015, 09:53:23 PM
With the issues of setting up an intelligent brainwallet, it makes sense that people would be better off not creating them unless aware and capable of securing them however if the wallet is unused and abandoned a few treasure troves are available for grabs.

The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
Someone didn't think that over.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: coinableS on August 08, 2015, 10:48:29 PM
I have no plans on ever using a brainwallet when there are much more secure ways to store my coins.
If I did decide to use one for some crazy reason I would include a salt and a separator symbol.

"Im@b34v3r^how^much^wood^could^a^woodchuck^chuck^if^a^woodchuck^could^chuck^wood"


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: jonald_fyookball on August 08, 2015, 10:53:08 PM
the really sad part is that this nursey rhyme is maybe forever ruined for the victim.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Soros Shorts on August 08, 2015, 11:47:53 PM

The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552


Next we'll hear about some moron using as a passphrase "peter piper picked a peck of picked peppers".


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: GermanGiant on August 09, 2015, 12:08:03 AM
As it seems, the Github source code of the brainwallet.org has also been taken down. Does anyone know about a copy of that repository ?


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Herbert2020 on August 09, 2015, 12:47:00 PM
The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"

i don't mean to be harsh but honestly if the passphrase of the brain wallet was "how much wood..." the owner deserves to lose 250BTC and more.
the first thing that the brainwallet itself in the password field suggests is not to use popular phrases.
https://www.google.com/search?q=how+much+wood+could+a+woodchuck+chuck+if+a+woodchuck+could+chuck+wood

there is even a film with the same name for gods sake!
https://en.wikipedia.org/wiki/How_Much_Wood_Would_a_Woodchuck_Chuck_(film)


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: manselr on August 09, 2015, 03:49:30 PM
I think this is a good thing. We must be exposed to all of the possible Bitcoin and Bitcoin related stuff flaw's as early in the game as possible. Imagine if this happened 10 years from now. Now we can afford taking big losses and big mistakes because we can fix them without much impact, since we are still very early on.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: bitcoinmasterlord on August 09, 2015, 04:08:34 PM
...
The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552
...

It is surprising to me that people who are knowledgeable enough about Bitcoin/bitcoin to know what a brainwallet is,
don't choose more complex phrases, especially when their bitcoins are at higher risk of theft, compared to a standard privatekey.
The "how much wood could a woodchuck..." saying or whatever it is considered could be chosen by tens of people, in theory.
With millions of users in the future, that one would pop up hundredths of times.

Good luck with your presentation.

That is unbelieveably. With that amount of coins on it it must have been an experienced bitcoiner. That he made such an error makes it hard for me to feel pity for him.

Guess bitcoiners don't actually need to know about security.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Financisto on August 26, 2015, 02:40:29 PM
The facts of this research are outstanding...

That's why I only rely on KDF (scrypt, bcrypt and PBKDF2), never fast hash functions (SHA family etc) for this purpose (Brainwallets).

Thanks for your educational work! The community just gets stronger with it!


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: ryanc on August 31, 2015, 01:09:51 AM
i don't mean to be harsh but honestly if the passphrase of the brain wallet was "how much wood..." the owner deserves to lose 250BTC and more.
the first thing that the brainwallet itself in the password field suggests is not to use popular phrases.
https://www.google.com/search?q=how+much+wood+could+a+woodchuck+chuck+if+a+woodchuck+could+chuck+wood

there is even a film with the same name for gods sake!
https://en.wikipedia.org/wiki/How_Much_Wood_Would_a_Woodchuck_Chuck_(film)

At the time that wallet was made, brainwallet.org had "correct horse battery staple" as the placeholder text. Nothing on the site said not to used phrases like that.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Financisto on August 31, 2015, 01:56:44 AM
Unfortunately that brainwallet.org project seemed too malicious by leaving that "correct horse battery staple" phrase as standard without leaving any previous  (and visible) warning.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: RGBKey on August 31, 2015, 02:01:34 AM
People should understand what makes brainwallets not safe/safe. It's possible for them to be safe, and that's where they can be beneficial, but it's also very easy to make them easily crackable.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Klestin on August 31, 2015, 02:12:19 AM
Come on man, people who know how to choose good passwords and store them correctly while using brainwallets are as safe as using other "normal" wallets. I have seen so many stupid missuses with the wallet.dat files so far that are as bad as bad brainwallet passwords.

This means nothing, if people are using brainwallets, they are not less safe automatically.

Yes, they absolutely are less safe automatically.  A person who wants to break your wallet.dat password must have your wallet.dat file.  Brainwallets have no file.

Brainwallet cracking tools can run extremely fast - the cracking can be run offline against an indexed version of the blockchain, and can be distributed among many bots.   A password of "m2wAHUnF91z" for instance (created from LastPass, and bearing approximately 51-57 bits of entropy, depending on how it's calculated) is absolutely reasonable for a wallet.dat password.  It is absolutely NOT fine as a brainwallet key.  Brainwallets should have no less than 128 bits of true entropy.

Creating a safe brainwallet is possible, but it is very difficult to do correctly.  You have to forget everything you've learned about how to pick a good password.  


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: erik777 on August 31, 2015, 02:35:07 AM

The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552


Next we'll hear about some moron using as a passphrase "peter piper picked a peck of picked peppers".

That would be secure, since Peter piper picked a peck of pickled peppers, not picked peppers. 


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Linuld on August 31, 2015, 10:03:23 AM
Come on man, people who know how to choose good passwords and store them correctly while using brainwallets are as safe as using other "normal" wallets. I have seen so many stupid missuses with the wallet.dat files so far that are as bad as bad brainwallet passwords.

This means nothing, if people are using brainwallets, they are not less safe automatically.

Yes, they absolutely are less safe automatically.  A person who wants to break your wallet.dat password must have your wallet.dat file.  Brainwallets have no file.

Brainwallet cracking tools can run extremely fast - the cracking can be run offline against an indexed version of the blockchain, and can be distributed among many bots.   A password of "m2wAHUnF91z" for instance (created from LastPass, and bearing approximately 51-57 bits of entropy, depending on how it's calculated) is absolutely reasonable for a wallet.dat password.  It is absolutely NOT fine as a brainwallet key.  Brainwallets should have no less than 128 bits of true entropy.

Creating a safe brainwallet is possible, but it is very difficult to do correctly.  You have to forget everything you've learned about how to pick a good password.  

That is interesting. But i don't understand yet why there is such a big difference in safety for having that passkey as a password for the wallet.dat or having it as the seed for a private key. Where does the difference come from? I mean bruteforcing should work at the same speed for both isn't it? Or are there iterations of the pass for the wallet.dat so that the time to bruteforce gets extended?


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: louise123 on August 31, 2015, 11:43:04 AM

The 250BTC Brainwallet passphrase was "how much wood could a woodchuck chuck if a woodchuck could chuck wood"
https://twitter.com/ryancdotorg/status/629862282831511552


Next we'll hear about some moron using as a passphrase "peter piper picked a peck of picked peppers".

That would be secure, since Peter piper picked a peck of pickled peppers, not picked peppers. 


LOL!
That is actually very funny. :D


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Mickeyb on August 31, 2015, 11:54:43 AM
Come on man, people who know how to choose good passwords and store them correctly while using brainwallets are as safe as using other "normal" wallets. I have seen so many stupid missuses with the wallet.dat files so far that are as bad as bad brainwallet passwords.

This means nothing, if people are using brainwallets, they are not less safe automatically.

Yes, they absolutely are less safe automatically.  A person who wants to break your wallet.dat password must have your wallet.dat file.  Brainwallets have no file.

Brainwallet cracking tools can run extremely fast - the cracking can be run offline against an indexed version of the blockchain, and can be distributed among many bots.   A password of "m2wAHUnF91z" for instance (created from LastPass, and bearing approximately 51-57 bits of entropy, depending on how it's calculated) is absolutely reasonable for a wallet.dat password.  It is absolutely NOT fine as a brainwallet key.  Brainwallets should have no less than 128 bits of true entropy.

Creating a safe brainwallet is possible, but it is very difficult to do correctly.  You have to forget everything you've learned about how to pick a good password.  

Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: favdesu on August 31, 2015, 12:04:03 PM
luckily, a white hat did it first. imagine you would wake up one day to check your paper wallet and it's emptied without any chance to get your coins back.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: mallard on August 31, 2015, 01:46:53 PM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Klestin on August 31, 2015, 02:36:17 PM
As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

Ideally, you should NOT let the computer do this for you. Use diceware or something similar that uses real-world randomness.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Klestin on August 31, 2015, 02:38:05 PM
That is interesting. But i don't understand yet why there is such a big difference in safety for having that passkey as a password for the wallet.dat or having it as the seed for a private key. Where does the difference come from? I mean bruteforcing should work at the same speed for both isn't it? Or are there iterations of the pass for the wallet.dat so that the time to bruteforce gets extended?

There are two functional differences:

1) For wallet.dat encryption, they need your wallet file, and can't attack your account without it.
2) Even if they have the wallet file, they have to expend their effort attacking your file.  In stark contrast, attacks against brainwallets attack ALL brainwallets simultaneously.  


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Mickeyb on August 31, 2015, 02:46:27 PM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

People are terrible in choosing passwords for themselves, I know that. But I kind of got from this thread that all brainwallets are doomed since they can be cracked with this software which is just not true if you have a strong and random password.

Concept of brainwallets works for NXT pretty well, OK they did have some hacks in the beginning, just because the users used famous phrases which you can look for with these kind of softwares very quickly and successfully. Now, when the users know what the strong password is and when they have option for client to choose it for them, brainwallets work well.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: ryanc on August 31, 2015, 02:57:41 PM
That is interesting. But i don't understand yet why there is such a big difference in safety for having that passkey as a password for the wallet.dat or having it as the seed for a private key. Where does the difference come from? I mean bruteforcing should work at the same speed for both isn't it? Or are there iterations of the pass for the wallet.dat so that the time to bruteforce gets extended?

There are two functional differences:

1) For wallet.dat encryption, they need your wallet file, and can't attack your account without it.
2) Even if they have the wallet file, they have to expend their effort attacking your file.  In stark contrast, attacks against brainwallets attack ALL brainwallets simultaneously.  

There's also 3:

3) The wallet encryption uses a slow hash that takes a significant fraction to compute, whereas brainwallets can be attacked pretty much as fast as you an compute the public keys.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Financisto on September 01, 2015, 01:32:00 AM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

People are terrible in choosing passwords for themselves, I know that. But I kind of got from this thread that all brainwallets are doomed since they can be cracked with this software which is just not true if you have a strong and random password.

Concept of brainwallets works for NXT pretty well, OK they did have some hacks in the beginning, just because the users used famous phrases which you can look for with these kind of softwares very quickly and successfully. Now, when the users know what the strong password is and when they have option for client to choose it for them, brainwallets work well.
I almost forgot that NXT is a brainwallet per se.

I did some research some time ago but couldn't find how NXT hashes the passphrase which locks/unlocks the account.

Does anyone here know about it?

Is it just sha256(passphrase)? It can't be that easy...


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: NorrisK on September 01, 2015, 06:37:32 AM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

People are terrible in choosing passwords for themselves, I know that. But I kind of got from this thread that all brainwallets are doomed since they can be cracked with this software which is just not true if you have a strong and random password.

Concept of brainwallets works for NXT pretty well, OK they did have some hacks in the beginning, just because the users used famous phrases which you can look for with these kind of softwares very quickly and successfully. Now, when the users know what the strong password is and when they have option for client to choose it for them, brainwallets work well.
I almost forgot that NXT is a brainwallet per se.

I did some research some time ago but couldn't find how NXT hashes the passphrase which locks/unlocks the account.

Does anyone here know about it?

Is it just sha256(passphrase)? It can't be that easy...

I think it would be best to ask that in the NXT thread or on the NXT forums. You will probably get a prompt answer and may even change their hashing methods by asking :)


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Linuld on September 01, 2015, 01:36:44 PM
I think a good way to beat this bad behaviour of some bitcoiners would be that a hacker (not cracker) would check out all possible combinations, create a huge wallet with it and everytime he finds someone is using such a stupid brainwallet then he might withdraw, let's say 0.00001337 Bitcoins. The user would be warned and can push his coins.

Of course there is the risk that a cracker finds the same coins and withdraws them. But there is no way for the hacker to withdraw all and give it back to the real owner of the address.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Shogen on September 01, 2015, 02:05:11 PM
As it seems, the Github source code of the brainwallet.org has also been taken down. Does anyone know about a copy of that repository ?

It is still there on Github. You just need to browse the repository before the final commit was made.
https://github.com/brainwallet/brainwallet.github.io/tree/f7679dd03f39a04edced641960a7c3df1116fea9


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Mickeyb on September 01, 2015, 03:36:43 PM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

People are terrible in choosing passwords for themselves, I know that. But I kind of got from this thread that all brainwallets are doomed since they can be cracked with this software which is just not true if you have a strong and random password.

Concept of brainwallets works for NXT pretty well, OK they did have some hacks in the beginning, just because the users used famous phrases which you can look for with these kind of softwares very quickly and successfully. Now, when the users know what the strong password is and when they have option for client to choose it for them, brainwallets work well.
I almost forgot that NXT is a brainwallet per se.

I did some research some time ago but couldn't find how NXT hashes the passphrase which locks/unlocks the account.

Does anyone here know about it?

Is it just sha256(passphrase)? It can't be that easy...

I am sure it's not that easy, otherwise all people's NXT would just be gone. I have forwarded this thread to my good friend who's deeper with NXT, I am sure somebody will reply and let us know.

Cheers!


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: box0214 on September 01, 2015, 03:46:23 PM
NXT uses sha256() i believe. not sure, best to ask the nxt ppl.

regardless i think many people use simple passphrases and it gets cracked. especially if its all alphanumeric only. anyone know if this cracker that's been released that can crack 150+ passphrase if it was all alphabets? what if you used non-standard characters like chinese or russian???

i wonder how nxt is compared to ethereum? has anyone compared the two? aside from the price, nxt seems kinda cheap with all the development going on there.




Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Damelon on September 01, 2015, 03:48:16 PM
Wait, you take a dictionary, even an English one (even better if you are a foreigner so you use a foreign dictionary, but lets assume you use and English one) and you choose 12 random words of 6+ letters (even 5 letter words are OK but just to make sure) and you will have a random password with 128 bit+ entropy which is very safe. Of course, you write it down on a piece of paper.

The problem is that average people don't know that's done like this correctly and they use famous phrases and other crap instead.

As shown by this thread, people aren't very good with random-ness.
You should let the computer do this for you.

People are terrible in choosing passwords for themselves, I know that. But I kind of got from this thread that all brainwallets are doomed since they can be cracked with this software which is just not true if you have a strong and random password.

Concept of brainwallets works for NXT pretty well, OK they did have some hacks in the beginning, just because the users used famous phrases which you can look for with these kind of softwares very quickly and successfully. Now, when the users know what the strong password is and when they have option for client to choose it for them, brainwallets work well.
I almost forgot that NXT is a brainwallet per se.

I did some research some time ago but couldn't find how NXT hashes the passphrase which locks/unlocks the account.

Does anyone here know about it?

Is it just sha256(passphrase)? It can't be that easy...

I am sure it's not that easy, otherwise all people's NXT would just be gone. I have forwarded this thread to my good friend who's deeper with NXT, I am sure somebody will reply and let us know.

Cheers!

From the Nxt Whitepaper: https://www.dropbox.com/s/cbuwrorf672c0yy/NxtWhitepaper_v122_rev4.pdf

Quote
2.4.2 Accounts
Nxt implements a brain wallet as part of its design: all accounts are stored on
the network, with private keys for each possible account address directly derived
from each account’s passphrase using a combination of SHA256 and Curve25519
operations.
Each account is represented by a 64-bit number, and this number is expressed
as an account address using a Reed-Solomon14 error-correcting notation that
allows for detection of up to four errors in an account address, or correction of
up to two errors. This format was implemented in response to concerns that
a mistyped account address could result in tokens, aliases, or assets being irreversibly
transferred to erroneous destination accounts. Account addresses are
always prefaced by “NXT-”, making Nxt account addresses easily recognizable
and distinguishable from address formats used by other cryptocurrencies.
The Reed-Solomon-encoded account address associated with a secret passphrase
is generated as follows:

1. The secret passphrase is hashed with SHA256 to derive the account’s
private key.
2. The private key is encrypted with Curve25519 to derive the account’s
public key.
3. The public key is hashed with SHA256 to derive the account ID.
4. The first 64 bits of the account ID are the visible account number.
5. Reed-Solomon encoding of the visible account number, prefixed with “NXT-
”, generates the account address.

When an account is accessed by a secret passphrase for the very first time, it
is not secured by a public key. When the first outgoing transaction from an
account is made, the 256-bit public key derived from the passphrase is stored
on the blockchain, and this secures the account. The address space for public
keys (2256) is larger than the address space for account numbers (264), so there
is no one-to-one mapping of passphrases to account numbers and collisions are
possible. These collisions are detected and prevented in the following way: once
a specific passphrase is used to access an account, and that account is secured
by a 256-bit public key, no other public-private key pair is permitted to access
that account number.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Uptrenda on September 01, 2015, 04:22:01 PM
But my dog's name is still safe right?


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Damelon on September 01, 2015, 04:35:33 PM
But my dog's name is still safe right?

Only if called 123abc


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: bri912678 on September 01, 2015, 04:52:52 PM
But my dog's name is still safe right?

Only if called 123abc


If it was a NXT brain wallet pass phrase his dog's name would need to be at least 30 characters long to be secure. There are servers constantly attempting to crack NXT wallet pass phrases using lists of passwords called rainbow tables.

No doubt all the quoted advice for creating strong NXT pass phrases also applies to creating strong Bitcoin pass phrases.

https://wiki.nxtcrypto.org/wiki/How-To:GenerateStrongPassword



Quote
30 characters??!? Isn't that too much?

For most applications, yeah. But Nxt works differently.

In most other applications, an attacker can only try to break into one account at a time. A smart attacker will not try passwords randomly. They will run through a prepared list of passwords and resulting hashes (that list is called a rainbow table), hoping to find the one password that can access your account.

As technology improves and processing power increases, attackers can prepare larger and larger rainbow tables. The key to creating a safe password is to stay ahead of the processing curve, to avoid being simple enough to be included in rainbow tables and so escape easy discovery.

Most applications are such that an attacker can go after only one account at a time. Your bank, e-mail, and online shopping accounts are like this. For such applications, a password of 15 varied characters that don't form readable words or patterns is currently very safe, well beyond what attackers can feasibly include in their rainbow tables.

Nxt works differently. In order to have the convenience of accessing your account through just a single passphrase, without a login name or wallet file, it also allows an attacker to try ALL accounts at the same time and greatly increases their chances of success. With everyone's account balance in the prize pot, the rewards become much higher, so there's compelling reason for them to focus a lot more resources on extending rainbow tables.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: box0214 on September 01, 2015, 06:54:17 PM
it seems the best way to create a nxt brain wallet is by using a combination of data only you know. say phone numbers,  addresses, and chinese/japanese characters. Then mix it up with your own password. good luck trying to guess that and no way in hell would you forget it nor the need to write it down.

right now nxt has the ability to host bitcoin addresses via the multigateway, in effect giving nxt the ability to host your other coins with just one passphrase.

www.jnxt.org/nxt -- login with account to test it out: NXT-MRCC-2YLS-8M54-3CMAJ


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: eternalgloom on September 01, 2015, 07:35:28 PM
it seems the best way to create a nxt brain wallet is by using a combination of data only you know. say phone numbers,  addresses, and chinese/japanese characters. Then mix it up with your own password. good luck trying to guess that and no way in hell would you forget it nor the need to write it down.

right now nxt has the ability to host bitcoin addresses via the multigateway, in effect giving nxt the ability to host your other coins with just one passphrase.

www.jnxt.org/nxt -- login with account to test it out: NXT-MRCC-2YLS-8M54-3CMAJ
Yeah indeed, it's also best to use some words that can't be found in dictionaries and add special characters in front of and in between words.
Plus you'd need to use a passphrase of at least 64 characters.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: ryanc on September 02, 2015, 06:07:50 AM
it seems the best way to create a nxt brain wallet is by using a combination of data only you know. say phone numbers,  addresses, and chinese/japanese characters. Then mix it up with your own password. good luck trying to guess that and no way in hell would you forget it nor the need to write it down.

right now nxt has the ability to host bitcoin addresses via the multigateway, in effect giving nxt the ability to host your other coins with just one passphrase.

www.jnxt.org/nxt -- login with account to test it out: NXT-MRCC-2YLS-8M54-3CMAJ
Yeah indeed, it's also best to use some words that can't be found in dictionaries and add special characters in front of and in between words.
Plus you'd need to use a passphrase of at least 64 characters.

...just use diceware - you'll probably screw up picking one with meat. Some of the brainwallets I cracked were in chinese and russian. If I am reading that whitepaper right, NXT is actually weaker than normal brainwallets because curve25519 is substantially faster than secp256k1 for public key generation.

Passphrase length does not matter. Passphrase language does not matter. All that matters is predictability. There is no way to measure the predictability of human-generated passphrases, but we can measure the predictability of random passphrases. So use random passphrases.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: aakashsangwan on September 02, 2015, 02:29:03 PM
Can someone please tell me that how to use this software ???
I'm currently running Windows, but know some backtrack too


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: Damelon on September 02, 2015, 05:29:09 PM
Passphrase length does not matter. Passphrase language does not matter. All that matters is predictability. There is no way to measure the predictability of human-generated passphrases, but we can measure the predictability of random passphrases. So use random passphrases.

I'd like to bold this for emphasis.

If you'd use the entire King James Bible as a passphrase, it would be easy to crack.


Title: Re: "Why I'm releasing a brainwallet cracker at DEFCON 23"
Post by: almightyruler on September 17, 2018, 07:55:40 PM
I know this thread is 3 years old, but I'd like to post something I just found:

Bitcoin Address:
  1GjjGLYR7UhtM1n6z7QDpQskBicgmsHW9k

Text:
  how much wood could a woodchuck chuck if a woodchuck could chuck wood

Timestamp:
  2013-02-14 02:07:30 UTC


Listed on: https://bitsig.io/?addr=1GjjGLYR7UhtM1n6z7QDpQskBicgmsHW9k

Unless bitsig.io have retroactively listed well known brainwallet phrases, it seems that the original owner of woodchuck may have used bitsig.io to generate the wallet address. In full public view.


---

edit: Seems bitsig.io was registered only in 2015, well after this address was used, so I guess they did retroactively list brainwallet phrases. So nothing too amazing here.

Maybe they used brainflayer to crack them. :)