Bitcoin Forum
June 21, 2024, 06:47:21 PM *
News: Voting for pizza day contest
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 »
141  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 17, 2020, 01:40:04 PM
Missing symbols: 15. Try 24986644000165536000 possible combinations

you need some cores for this matter, besides amazon and google, they will
be able to provide some cores for cheap. let it know if you try,
142  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: July 15, 2020, 01:02:36 AM


Do you use BSGS with any server?


Just local.
143  Bitcoin / Bitcoin Discussion / Re: Science Fair Project to trap Bitcoin private keys using Kangaroos! on: July 14, 2020, 06:13:50 PM
ok great to have had you around. bye
144  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: July 14, 2020, 01:13:37 PM
i want? cool. i take em all, so kangaroo yes...
if a bsgs i always loved, superb lists of keys boom there in a jiffy,
with not to much crap on the screen, just the needed, only memory?
pubkeys as you know around 120bits puzzle version right now. got some my own,
but that beside this all.

145  Bitcoin / Development & Technical Discussion / Re: BitCrack - A tool for brute-forcing private keys on: July 14, 2020, 12:13:26 AM
Can someone throw off the working version of pikachunakapika / bitcrack??? I searched the Internet and cannot find anywhere. need a random function. on https://github.com/ deleted. Please friends help.
Your best bet is to create a batch file that does the random for you. The random function in the version you are speaking about is slower because it takes more time to regen the randomness than to just go in sequential order. A batch function lets you jump in and out of ranges randomly. I have python script that writes batch script with random ranges. You can select the low and high of the range for example:
Low:  8B00000
High: 8BFFFFF

So the script will randomly generate a start and end range inside of that range. Or, use the --share option for "randomness"

Share the script. Itself could not write as it should.

Here is the python script (I run python 2.7 on Windows):
Code:
# Randomizer for BitCrack
# Amateur Coding by the Wandering Philosopher

import os
import random
from datetime import datetime
random.seed(datetime.now())

arq1 = open('RandomBitCrack.bat', 'w')
y = ("FFFFF")
Y1 = int(y, 16)

arq1.write(":while1" + '\n')
for x in range(20):
    
    low  = 0x000000000000000000000000000000000000000000000000ED00000000000000
    high = 0x000000000000000000000000000000000000000000000000EDFFFFFFFFFFFFFF
    blah1 = random.randrange(low, high)
    blah = str( hex( random.randrange( low, high ) ) ).rstrip("L").replace("0x", "00000000000000000000000000000000000000000000000")
    eazy = hex(blah1 + Y1).rstrip("L").lstrip("0x")
    arq1.write("start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace " + hex(blah1).rstrip("L").lstrip("0x") +":" + eazy + " -i 64.txt -o FOUNDTHEPRIVATEKEY.txt" + '\n' + "timeout /t 6 /nobreak" + '\n' + "taskkill /im cb1.exe /f" + '\n' + "timeout /t 1 /nobreak" + '\n')
    
arq1.close()

Batch file produced:
Code:
:while1
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9f957a417cae:ed5f9f957a517cad -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5ce1cdf696c89f:ed5ce1cdf6a6c89e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede87bf0498ffc93:ede87bf0499ffc92 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed4482d8f1e25b9e:ed4482d8f1f25b9d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbd36f37234898c:edbd36f37244898b -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8511d049941d6f:ed8511d049a41d6e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9b5cd289b8ef:ed5f9b5cd299b8ee -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8a07e85d77b716:ed8a07e85d87b715 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed91263ac5f6d2ca:ed91263ac606d2c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1d4a9023dd6bfb:ed1d4a9023ed6bfa -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed72d72cee1da3ca:ed72d72cee2da3c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1b50d6fc437042:ed1b50d6fc537041 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed71ac3573476040:ed71ac357357603f -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed2ac546cac9806e:ed2ac546cad9806d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace eddf6d5744433345:eddf6d5744533344 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edb5ca5f89c2c400:edb5ca5f89d2c3ff -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbaa4935a4fda3e:edbaa4935a5fda3d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbe2cbe32f92f56:edbe2cbe33092f55 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede9ad4e751e6975:ede9ad4e752e6974 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed7484d8f9fb1ee7:ed7484d8fa0b1ee6 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak

If you want to produce more than 20 random ranges, adjust the "for x in range(20):" in the code for however many you want. I normally run 1000.

If your bitcrack .exe file is named something else (which it probably is) change the "cb1" in both spots to the name of your bitcrack .exe file.

If your device number is something different, change it from -d 1 to whatever yours is, example -d 0.

You can adjust the time the script runs in each range by changing the "timeout /t 6 /nobreak" example, if you want each range to be searched for 60 seconds, change it to "timeout /t 60 /nobreak".

If you want to have different gpu settings other than "-b 64 -t 256 -p 256" adjust them.

If your input file is named something else besides "64.txt" change it to whatever your input file is (input file of what addresses you are searching for).

If you want your output file to be something other than "FOUNDTHEPRIVATEKEY.txt" change it to your desired output name.

Once you've made any changes, run the python script and it will automatically generate the batch file. Place the batch file inside your bitcrack folder, with the bitcrack.exe file, and your input file, and let it rip.

It's nothing fancy, just a low down and dirty python script that allows me to search random ranges without modifying/hacking the code inside bitcrack code and slowing it down any.

Edit: one last thing, I have it set up to randomly generate a range of "FFFFF", change that if you want a larger or smaller range. Change the "y = ("FFFFF")" option.  I chose that range b/c my GPU can get through that range within the 6 seconds.

WanderingPhilospher
Hi there, is this also available for jl's kangaroo or alek's. thanks man again for great piece there.
146  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 13, 2020, 12:42:53 AM
hi andzhig,

is this the one we should use or the previous one, so much code put on my screen,
i am totally lost there, as others.

better such a variation with many copies running simultaneously...

Quote

and what if found pk. its only in the saved txt file . but is it also on the screen i mean?
thanks for you'r code
147  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: July 11, 2020, 10:51:44 PM
Andzhig hi man,
could you please explain, what is this.


16389 512 1024 288 666666666666666666666 21 13JVTR27W6p1dfaYRDGfidAi6fsuAzeHa2 16w7NiRmoNCWcyNWHV6DBLrwPKQAhWC8dq   36     666 666 666 666 666 666 666   (800, 0) (800, 0) (800, 0) (800, 0) (800, 0) (800, 0) (800, 0)

so this is the bomb dot com software man. where is the pk. or only if found inside txt saved.txt ?
148  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 09, 2020, 02:08:16 PM
yes buddy please make that one thanks ahead.
149  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 08, 2020, 05:43:34 PM
wot Etar, you did that for me, thanks a lot mate,
great piece still working flawless,
150  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 08, 2020, 10:41:55 AM
Time to refresh the discussion  Grin
Edit:i was wrong.

Hey there, i have 64 bit address and -dp 20 or 21 it has 524288 or more Left, and didn't do 1 in 24hrs. whats wrong, is it a solver issue, bitcrack issue, could you get rid off those random addressess. so only report current place and percentage of something, now took 2 days nothing nada happened yet. could you add Telariusts bitcrack version. thanks a lot.
151  Bitcoin / Development & Technical Discussion / Re: Bitcoin Address Utility I made (Visual C#, Source Only) on: July 08, 2020, 12:22:02 AM
the thing is when manually added the address with balance. it shows 0 btc,

Possibly because blockexplorer.com no longer works.
well i guess the question remains, could you make the change in there, so we could use it with blockchain. or btc

thanks again
152  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 07, 2020, 02:23:19 PM
wow great thanks a lot for that information. guess needed it a lot.
now i can continue, now it works. great pieces. your's and brichard's work.
good luck

As for me DP not so simple. Then I crack 64 bytes with DP 20, key was not be found, and with dp 16 key was found. This on 2080ti.
what key you find?
153  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 07, 2020, 02:11:16 PM
wow great thanks a lot for that information. guess needed it a lot.
now i can continue, now it works. great pieces. your's and brichard's work.
good luck
154  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 07, 2020, 12:50:10 PM
Maybe any one can share map file from crackServer?

hi there etar,

where does it get those 32 addressess. i mean it finds those 32 but writes one
at the end inside this file with a date and winkey.txt inside the default folder the test.bat.
so when run 1 time, at the end of those 32 can it show the keys saved inside the xxx.txt cause right
now nowhere the pkey for 31 of them to be found. is it.?
thanks man.
in test.bat address main addres 1EeAxcprB2PpCnr34VfZdFrkUWuxyiNEFv and -dp 6 and range 8000000000:ffffffffff
This mean that whole range devide into 32subranges. And each of this subranges in random way go to client.
So Task for client is find 1EeAxcprB2PpCnr34VfZdFrkUWuxyiNEFv but to prof of work, that client realy solve rubrange, server add 1 address randomly generated on the fly in this subrange.
So client get 2 address in each job. main address and pow address. And he need at worst case solve 1 address and in the best 2 address.
Once main key solved server creat winkey.txt file where put privat key and address. PK from pow keys never stored no where.
File xxx.txt created only on clientside and always deleted by client app.
ok took some time, but i get it now, random no problemo, its on the same road, ok thanks for the answer, what if i dont want to solve those random address takes time to solve them?.
just the 64th puzzle how you start like wich -dp  and is dp21 to high?
Etar and one more question, it sits at 21.00 start time, for over a day, without showing anything, is there a verbose option or more details while this waiting happens, thanks
155  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 06, 2020, 08:41:48 PM
Maybe any one can share map file from crackServer?

hi there etar,

where does it get those 32 addressess. i mean it finds those 32 but writes one
at the end inside this file with a date and winkey.txt inside the default folder the test.bat.
so when run 1 time, at the end of those 32 can it show the keys saved inside the xxx.txt cause right
now nowhere the pkey for 31 of them to be found. is it.?
thanks man.
156  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: July 04, 2020, 09:23:45 AM

Hi, I have finished the 64 bit range, but I have not found any key with 8 rx 570 8gb.



assuming that your  8 rx570 can do 1Gkeys/s.  (10^9 keys/s)
puzzle 64 requires cheking 2^63 keys which is around 10^19 keys. So you need to wait 10^10 seconds to claim spanning the whole range.
10^10 seconds is over 300 years.
As I have been saying many times before, there is a bug in clBitCrack :

see this https://github.com/brichard19/BitCrack/issues/256
this mentioned issue did you fix it with RB61's commit.
thanks a lot again. many bitcrack versions around all aimed his fork i pressume.
157  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: June 27, 2020, 02:12:13 PM
hi @BitCrack
Will you consider releasing a server-client version of bitcrack  ?

Yes, I have been working on it for a little while.
brichard you'r app speaks for itself, no talks just run,

any news under the sun about updates or anything like that, server thing.
thanks
158  Bitcoin / Development & Technical Discussion / Re: Bitcoin Address Utility I made (Visual C#, Source Only) on: June 27, 2020, 01:29:33 PM
but is cascasius present at forum, or reading this,
Barely. Last activity on bitcointalk was 2019-12-29. Last activity on GitHub was 2013-02.

ok, ty

the thing is when manually added the address with balance. it shows 0 btc,
the same when generating,
when the app gonna scan the balance? do you need internet doh? but always show 0?
is there some secret setting that turned this stuff off, to be turned on soon>? or never.

159  Bitcoin / Development & Technical Discussion / Re: Pollard's kangaroo ECDLP solver on: June 21, 2020, 04:52:01 PM
anyone got link for the newest bitcrack app, besides the github one, that is still not updated long time.

https://github.com/brichard19/eclambda

Can anyone try my tool on a 2080ti? On a 2080S it gets around 1300MKeys/sec when using 24-bit DP.



is this Bitcrack GPU version ?!
No,
Bitcrack support GPU

Thank you brichard19 for OpenCL version of Pollard's kangaroo
I get  263.40 Mpt/s for my RX480 8Gb.
 
what is your gpu-mem-usage setting?
160  Bitcoin / Bitcoin Discussion / Re: Bitcoin puzzle transaction ~32 BTC prize to who solves it on: June 19, 2020, 12:50:34 PM
what happens when you run this file Andzhig?
i see a gazillion numbers passing by. what happens there,
Pages: « 1 2 3 4 5 6 7 [8] 9 10 11 12 13 14 15 16 17 18 19 20 21 22 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!