Bitcoin Forum
June 20, 2024, 01:45:34 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 [98] 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 »
1941  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 08:33:08 AM

edit: Found. nice. even supports GPUs, will test that now...

Nice! I blame myself for not keeping at least on GPU to play with opencl with. Just out of curiosity, could you post the speeds you get with a GPU cracking GPG?

Just let me know if you need any help with building etc.

Thanks!
john supports OpenCL and CUDA, altough only some hashalgos/implementations, GPG not (as far ive read) yet.
1942  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 07:46:13 AM
care to share jtr for GPG?

Google is your friend!

But, what the h-ll... It's Christmas, right?
http://www.ubuntuvibes.com/2012/10/recover-your-gpg-passphrase-using-john.html
i didnt google to be honest as i asked for what solution hes using, well i guess its going to be the same. ty anyways Smiley
1943  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 07:31:45 AM
Naw - this invalidates the searches I made earlier. Not that it would have helped as it sounds like the salt mod is difficult to guess.

Seems like we are all helping each other out (in true Christmas spirit!) so I reveal that I use JohnTheRipper to get 10k+ passwords/sec per core. You can't use it out of the box, but you will find a special modded version helpful for GPG  Wink

We're playing n equal grounds here so I'd say let out the 3rd hint at 100 verifications! We need it! Cheesy

As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
care to share jtr for GPG?
1944  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 06:53:13 AM
you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.

no problem, would be boring if its easy Tongue
1945  Bitcoin / Pools / Re: [400GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: December 26, 2012, 06:44:37 AM
i'm at 188 shares and 1 orphan now, after modifying source to allow more outgoing connections
u see Wink i just improved ur mining alot Cheesy
1946  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 06:42:02 AM
As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
1947  Bitcoin / Pools / Re: [400GH/s] p2pool: Decentralized, DoS-resistant, Hop-Proof pool on: December 26, 2012, 06:40:04 AM
Hello, everyone. Today I try joining to p2pool and I have some problems.
My OS: Ubuntu 12.04.1 64 bit
Bitcoind version:
Code:
$./bitcoind getinfo
....
 "version" : 70100,
  "protocolversion" : 60002,
  "walletversion" : 40000,
....
Python version: 2.7.3

Today I download the tgz-archive with p2pool v 9.4 for 64-bit Linux.
Then I installed required packages:
sudo apt-get install python-zope.interface python-twisted python-twisted-web

After the bitcoind successfully running, and all of the blocks are downloaded, I run file "run_p2pool.py", and:
Code:
$./run_p2pool.py
2012-12-26 07:36:45.305205 > Error while checking Bitcoin connection:
2012-12-26 07:36:45.305419 > Traceback (most recent call last):
2012-12-26 07:36:45.305524 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 545, in _runCallbacks
2012-12-26 07:36:45.305624 >     current.result = callback(current.result, *args, **kw)
2012-12-26 07:36:45.305726 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 1095, in gotResult
2012-12-26 07:36:45.305871 >     _inlineCallbacks(r, g, deferred)
2012-12-26 07:36:45.305966 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 1037, in _inlineCallbacks
2012-12-26 07:36:45.306088 >     result = result.throwExceptionIntoGenerator(g)
2012-12-26 07:36:45.306208 >   File "/usr/lib/python2.7/dist-packages/twisted/python/failure.py", line 382, in throwExceptionIntoGenerator
2012-12-26 07:36:45.306317 >     return g.throw(self.type, self.value, self.tb)
2012-12-26 07:36:45.306418 > --- <exception caught here> ---
2012-12-26 07:36:45.306519 >   File "~/forrestv-p2pool-6880123/p2pool/util/deferral.py", line 41, in f
2012-12-26 07:36:45.306623 >     result = yield func(*args, **kwargs)
2012-12-26 07:36:45.306721 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 1037, in _inlineCallbacks
2012-12-26 07:36:45.306828 >     result = result.throwExceptionIntoGenerator(g)
2012-12-26 07:36:45.306930 >   File "/usr/lib/python2.7/dist-packages/twisted/python/failure.py", line 382, in throwExceptionIntoGenerator
2012-12-26 07:36:45.307052 >     return g.throw(self.type, self.value, self.tb)
2012-12-26 07:36:45.307158 >   File "/mnt/1/exdeath/forrestv-p2pool-6880123/p2pool/bitcoin/helper.py", line 13, in check
2012-12-26 07:36:45.307267 >     if not (yield net.PARENT.RPC_CHECK(bitcoind)):
2012-12-26 07:36:45.307366 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 1037, in _inlineCallbacks
2012-12-26 07:36:45.307465 >     result = result.throwExceptionIntoGenerator(g)
2012-12-26 07:36:45.307557 >   File "/usr/lib/python2.7/dist-packages/twisted/python/failure.py", line 382, in throwExceptionIntoGenerator
2012-12-26 07:36:45.307661 >     return g.throw(self.type, self.value, self.tb)
2012-12-26 07:36:45.307761 >   File "~/forrestv-p2pool-6880123/p2pool/bitcoin/networks.py", line 16, in <lambda>
2012-12-26 07:36:45.307865 >     'bitcoinaddress' in (yield bitcoind.rpc_help()) and
2012-12-26 07:36:45.307963 >   File "/usr/lib/python2.7/dist-packages/twisted/internet/defer.py", line 1037, in _inlineCallbacks
2012-12-26 07:36:45.308069 >     result = result.throwExceptionIntoGenerator(g)
2012-12-26 07:36:45.308166 >   File "/usr/lib/python2.7/dist-packages/twisted/python/failure.py", line 382, in throwExceptionIntoGenerator
2012-12-26 07:36:45.308313 >     return g.throw(self.type, self.value, self.tb)
2012-12-26 07:36:45.308415 >   File "~/forrestv-p2pool-6880123/p2pool/util/jsonrpc.py", line 64, in callRemote
2012-12-26 07:36:45.308519 >     raise e
2012-12-26 07:36:45.308617 > twisted.web.error.Error: 401 Authorization Required


I will be very grateful to anyone who help me fix this.
suply username and password, run p2pool with --help for a list of all parameters.
1948  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 05:49:17 AM
Am very appreciative of the effort being put into this and am guessing that unless there is a hacker with a lot of free computing power it will be very much a case of luck with the "riddle" at this stage (and as promised then next hint won't really make much difference).
computing power isnt the problem atm, its the salt.
1949  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 05:20:05 AM
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
C code?

I thought I was the one coming from behind as right now I'm on a measly Core2Duo laptop, and only using one thread. I wanted to adapt the code for sha256 and then add multi-threading, and then finally get it running on a faster computer. The salting algorithm can be "trial by hand" as a 4-char cycle is still about 15 hours for me. If I can get it to < 1 hour then I'd add reading a salt template from a file.

I'll not give my own code mods but for starts: I'm nasty and google is your friend.

You'll want to install the gpgme library, (sudo apt-get install libgpgme11-dev)
and even after that do some reading before you can compile due to large file support.

This way works but I'm by no means certain that there isn't some much faster method.

BTW: A word of warning, don't pump gpg with pwds without disabling the gpg-agent first. I got into a real pickle when the agent popped up with a "safe pwd window" for each password attempt. Ouch. But fast fingers with exiting the terminal actually worked. You can set the env variable to prevent that... eg.

GPG_AGENT_INFO='' myhackingprog

<sigh>This is what happens when you're an amateur.
i used "--no-use-agent --homedir" with homedir pointing to a special folder only for this.
till date i dont have it implemented in C, gonna do that later.
1950  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 04:30:57 AM
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
C code?
1951  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 04:30:33 AM
Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

...I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge....

Okay - if others feel the same then I won't make the next clue as revealing as I was going to (and any clue after that will not be released until the new year).

perfect Smiley
1952  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 02:26:47 AM
I used "vanitygen" to create the address so am pretty certain that the encrypted content would start with:

Privkey:5

so password is in the following format?
Code:
Privkey:${privkey}
if so u should have told us earlier, we'r all searching for a real privkey.

I was answering a question about what the *decrypted content* of the GPG message looks like (not about the "salt" formatting - only the "hints" that I give out are directly about that).

sry didnt read the full post (in a hurry).
1953  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 02:10:05 AM
I used "vanitygen" to create the address so am pretty certain that the encrypted content would start with:

Privkey:5

so password is in the following format?
Code:
Privkey:${privkey}
if so u should have told us earlier, we'r all searching for a real privkey.
1954  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 01:15:45 AM
will there be a 3rd hint?
1955  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 12:33:23 AM
I used a Puppy distro on an old IBM Thinkpad X40 (am hoping to get a SUSE Studio distro that will work on it so I can share it but no luck getting that to boot so far).

I also have tested the exact same script on an OpenSUSE 12.2 install (running on 64 bit hardware).

ty
1956  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 26, 2012, 12:21:14 AM
something i was wondering, did u run the bash script in real linux or cygwin/similiar?
1957  Bitcoin / Bitcoin Technical Support / Re: Bitcoins gone on: December 25, 2012, 11:25:05 PM
Before you do anything else, search all your drives for any 'wallet.data' files. Save copies of every one you find.

search for wallet.dat not .data
if u didnt wipe ur harddisk then theres a script (have to search) who scans the full HD for privkeys/wallets.
1958  Bitcoin / Bitcoin Discussion / Re: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas stocking! on: December 25, 2012, 09:34:17 PM
I've brute forced all 62^4 combinations using the following "salt modifications":

password="${password}+${password}=${password}${password}@L3AsT"  (yeah - I didn't understand that this line was modified at first...)

After the "at least" hint:
password="${password}+${password}=${password}${password}>"
password="${password}+${password}=${password}${password}>="
password="${password}+${password}>=${password}${password}"
password="${password}+${password}>${password}${password}"
password="${password}+${password}=${password}${password}atleast"

No hit so far and no idea what to try next. I test ~10200 passwords per second so the entire space take some 20 minutes. That's using one core only. If I had more ideas on the salt mod I guess I could fire off 4 runs at once...
how r u getting 10.2kH/s?
1959  Alternate cryptocurrencies / Altcoin Discussion / Re: What's going to happen to the 1.3 million LTC on btc-e? on: December 25, 2012, 08:48:19 PM
"I will go mine LTC for 1 week while difficulty is 20 than drop out of mining for 2+ weeks while difficulty is 40. I will sell earned LTC
for as much as 40 didn't happened. I will make 2 times more money than if I mined BTC in that 1 week! I'm so smart, it's amazing!"

Unfortunately for you, retards, most buyers are obviously not retards.
hey, how u dare to tell others my mining tricks? Tongue
1960  Other / Archival / Re: Random sweeps into my public wallet totaling 519.704 - Lost and Found? on: December 25, 2012, 08:37:17 PM
(I understand that we don't know yet what's going on here, and it may or may not be vanity-address generator related)

VanityGen https://bitcointalk.org/index.php?topic=25804.0 is open source - does it have any similar issues or know problems?

no it hasnt, it relys on OpenSSL to generate random entropy for generating key, this system is complex enough to call it "true random". altough note there is no such thing as random in our universe, since this is so complex it just is called random, still its good enough for what its needed (no collisions so far)!

OpenSSL doesn't "generate" entropy, it obtains it. The quality of the entropy depends on the provider and not on OpenSSL. For example, if two people (using the same vanity address generator) provide OpenSSL with the same entropy and ask for the same public key prefix, they will get the same private key.

It is possible to build OpenSSL so that the value 0 is always provided as the entropy. This would not be an unusual bug. A developer might do this for testing or evaluating, and then forget to provide the real entropy in the released version.

check out the source of vanitygen then u know what im talking about.
Pages: « 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 [98] 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!