Show Posts
|
Pages: « 1 2 [3] 4 5 »
|
It is very likely that we will be soon witness another crisis after this pandemic event many people around the world are becoming jobless, in other word no financial to face the reality when this such phenomenon exit, add up the mortgage and bills to pay for, it is sure pain in the back to workaround and see what we can do for the upcoming month during this pandemic.
For me I will just thrown away any things that can be sell off, to support what do I need for, and stay on my list to dos after the event I don't have a family for the moment sure give me a time to not worry about.
How about you give me your thought on this event I might be adapt your idea and get some of it to surest my stability when the time comes,
|
|
|
I ain't gonna scam anybody who am I to do this to anyone in the board my life is sweet as a cherry my man do not need any sweetness to add for, I may get pre-diabetes if so, This scam has been tried over and over again, get a life man. Quit trying to drag others into your scam.
Yes why my dear, just for some clearer presentation. Can you link me to this thread your pointing out? I'd lovely like to see something similar to my hash output I can't help but feel this is a rehash of a previous thread trying to crack a wallet that was a challenge started in yet an earlier thread.
This is also you. Hello today I use hash cat to hash my wallet.dat but apparently I don't have the right gpu and OpenCL requirement to run the bruteforecing myself I'm would be happy to find someone who can even said to me what iteration it gets this is the hash $bitcoin$64$cace7ac50d843272b6e9ec834ac9a85bf1fa71176423ec780848d099d5856746$16$f61f668243cb1ca5$127854$2$00$2$00
|
|
|
Sorry for being so persistent to look at the encrypted wallet.dat, happen is all I'm looking was bytes after bytes after bytes just add the randomness could make someone paranoid as myself but foremost thank you being there to answer dumb question and ignorant knowledge which oneself had, still eager to learn so much, I'll locking the thread now, There is absolutely nothing in the wallet.dat that will reveal what the passphrase is. There is no encoding information, no metadata, nothing. The passphrase is taken in as a series of bytes, hashed and turned into pseudorandom bytes which is then used to encrypt another series of randomly generated bytes which is what actually encrypts the private keys. NONE of the bytes derived from the passphrase is even stored in the wallet at all. It's all held in memory and purged when no longer needed. The actual encryption key is not text nor is it the passphrase. It's just random data.
Again, as has been repeated so many times to you. use btcrecover to brute force the passphrase. Inspecting the wallet.dat file by hand is not useful and is not going to help you.
|
|
|
Can you link me to this thread your pointing out? I'd lovely like to see something similar to my hash output I can't help but feel this is a rehash of a previous thread trying to crack a wallet that was a challenge started in yet an earlier thread.
|
|
|
Hello BTT user today I want to crack my wallet for what ever reason 50btc on the line I'd be happy to pay 30% of the current BTC that the wallet have, so for anyone want to try their rig this is the chance what are you waiting for! Here is the method you can try and crack my wallet Through hashcat: $bitcoin$64$cace7ac50d843272b6e9ec834ac9a85bf1fa71176423ec780848d099d5856746$16$f61f668243cb1ca5$127854$2$00$2$00 Through btcrecover: YmM6ys56xQ2EMnK26eyDSsmoW/H6cRdkI+x4CEjQmdWFZ0b2H2aCQ8scpW7zAQBo8AnW password hints: possible password I don't know if I mess up a bit on my password but at the time my keyboard was on chinese version if the password been made is chinese there's no chance to crack the wallet but as far as I know my password only contain 8 to 9 to 10 character only and possible password been used was h k w n e h a o don't know if there is a number or special symbol possible to Camel Case or One only or no camel case at all that's all wish you luck, mate! possible special symbol @#$ no Capatal letters I've doubt it but who knows, here is the list of website you can check for chinese weak password maybe as I use it, it's already been there somehow https://www.cnblogs.com/heycomputer/articles/10492259.htmlhttps://weakpass.com/wordlist
|
|
|
This is a bit late but I'm not trying to find whatever resemblance to let's say privatekey or any other key what I'm trying to achieve here is, finding the password been used to lock the wallet.dat if there is any indication inside the format of Berkeley that will tell this is the password been used ANCII, UTF8 or anything related hieroglyph and so forth, I'd try to open the wallet.dat file on bitcoincore and all it's information was the wallet purpose is unknown as you may refer to my other thread https://bitcointalk.org/index.php?topic=5235495.msg54097168#msg54097168I've tackling this wallet for a longer period of time and I might also quit my job decoding this wallet,
|
|
|
Thank you for all the support wish me luck on own very little project, maybe it is actually btcrecover who might be able to help me at this point, thus my curiosity on the wallet.dat formatted on json file astonish me to look for particular pattern of somehow related to privkey or any other information I could use to decode this wallet, by then thank you all I'll be locking the thread now,
|
|
|
i'll try my best thanks for the help I'll be locking the thread now as is I do get all the information I needed really thanks you achow I'm using latest bitcoincore release thus,, upon my investigation inside the wallet.dat file I can find a ckeyA which corresponds to the passcode been used to lock this wallet 'cause on my new default_wallet I cannot see any ckeyA that corresponds to my passcode which was 0919 but on the other hand of wallet.dat file I see ckeyA but after that a gibberish presentation I'f I could only knew what Berkeley using to hash this encrypted password I could perhaps somehow decrypt it using reverse engineering,
ckey is not the hashed password nor is it the password encrypted. A ckey record is followed by the public key, which is then followed by the encrypted private key. You are looking at the completely wrong place. The A is because the pubkey is prepended by its length which is 0x41 which happens to be the ascii A. If you want to "reverse engineer" your passphrase, then use https://github.com/gurnec/btcrecover to do it for you. You aren't going to learn it yourself by inspecting the wallet.dat file, it's not in there in plaintext. And you clearly don't understand the wallet format because you are chasing the completely wrong thing. This tool has already been written to do all that for you.
|
|
|
I'm using latest bitcoincore release thus,, upon my investigation inside the wallet.dat file I can find a ckeyA which corresponds to the passcode been used to lock this wallet 'cause on my new default_wallet I cannot see any ckeyA that corresponds to my passcode which was 0919 but on the other hand of wallet.dat file I see ckeyA but after that a gibberish presentation I'f I could only knew what Berkeley using to hash this encrypted password I could perhaps somehow decrypt it using reverse engineering, It could be not corrupt wallet as I said the core start up fine on my co worker's wallet but upon exchanging from my default_wallet (the core give) to the wallet.dat of my co-worker the core quit on it's own no whatsoever reasoning why the core did it
What version are you trying to use? If you are still trying to use 0.3.24, of course it won't work. It's too old and doesn't support encryption. Bitcoin Core has specific compatibility breaking things that disallow wallet downgrades. A wallet that supports encryption is inherently unopenable on older software.
|
|
|
It could be not corrupt wallet as I said the core start up fine on my co worker's wallet but upon exchanging from my default_wallet (the core give) to the wallet.dat of my co-worker the core quit on it's own no whatsoever reasoning why the core did it there's a function to the bitcoincore network where you can switch upon many wallets but you need to rename every wallet to not overwrite the first one (what the core give) How exactly are you attempting to "switch" wallets? The easiest method is to shut down Bitcoin Core. Once it is completely closed, then copy/move the current wallet.dat from the Bitcoin data directory. Then copy your "co-workers wallet.dat" into the Bitcoin Core data directory and overwrite the existing wallet.dat or, if necessary, rename it to wallet.dat. Then restart Bitcoin Core. If it starts up it'll probably want to rescan to get the wallet up to date with current blocks etc. At the end of that process you will have a better idea if the wallet contains anything. If it doesn't start up, either report what the error message shown is, or you can check the debug.log file for the errors... although chances are if it doesn't start up with the "co-workers wallet.dat" it is most likely not a Bitcoin Core wallet.dat or it is corrupted.
|
|
|
What happen was when I load the wallet.dat my co worker had the core star-up fine and upon some experimentation I could not swith from this wallet.dat file using the default_wallet the core given to me just force_quit no message or whatsoever, what next should I do opening it up using Bitcoin version 0.3.24 released
Open it using a modern version of Bitcoin Core that has the check. Don't use old software. It won't help you either way.
|
|
|
what next should I do opening it up using Bitcoin version 0.3.24 released Wallet needed to be rewritten: restart Bitcoin Core to complete
|
|
|
I'm quite don't know if it is particular to this board as I'd like to ask any one who's far smarter to me regarding to this core
I'd found on some articles that the bitcoin-qt 0.4.0 have a bug where upon upgrading wallet.dat from unencrypted to encrypted parts of unencrypted not necessarily overwritten leaving some private key accessible for a while thus the 0.4.1 0.5.0 making this bug fix
if it is true how could I possibly know where my wallet been encrypted to unencrypted and what version do I did this as I'm telling this' cause way back before I'd found a wallet to one of my co-workers pc 2008 to 2009 I guess this happen 2019 Dec, I just scramble his file and happen to get this is it possible that he mined during our time that's is why he is not here anymore and leaving me with some coins behind if so thanks for that but the file is encrypted and I don't quite guess the passcode to this wallet.dat
any help'
|
|
|
it is gibberish as it looks like thus far not making any symbolism of any kind, pub priv, etc... What do you actually have here? Are you able to open it in a text editor and see anything English?
Is it hexadecimal with just 1234567890abcde or does it have other letters and characters such as =.
What's keyA too? Could you post it's length if it is hexadecimal? People may be able to help but currently the op isn't greatly informative...
I'm looking for a particular prefix of the Json format to indicated any resemblance to the private key as I'm hoping this XY problem may be one of my curiosity to the wallet.dat I had sorry, This is clearly XY problem, if your goal requires master private key, private key, public key or bitcoin address, then as @achow101 mentioned, just open it in Bitcoin Core.
It's different story if the wallet.dat is encrypted and you don't know the password.
|
|
|
I'm not familiar with quote unquote version of making comment to one and the other as I'm pretty new to forum, but I'm quite a member here way back before and forget the rules I'ts my bad making wrong content hope for your forgiveness, thus is it so fun quote one by one replying to one other on my own board feels greet and making my thread a bit longer to my own satisfaction, by then, thank you all with all my soul making me perfect poster on the board and not getting bored correct Jr.member as myself here on the forum hope you all keep doing that,I'd never make this quoting one by one again thanks, You just double posted again. If you want to answer to multiple people, copy the quote code and write everything in the same post. E.g: user1 Answer1 user2 Answer2 user3 Answer3 Edit: now you triple posted... stop doing that. It's against the rules and you are making the same mistake again.
|
|
|
I'm not quite sure if it on topic or relevant but as far as I know I made the comment on one of my thread with all my heart, Was the post on topic with the original post at the start of a thread or a post the original poster made? Or was it in response to someone else in the thread?
Can you post what was deleted here or give a summary and suggest where you added it to the other topic...
It is just a comment made by me on the topic thread I make as simple as that, if it is the surest way to do I'd lovely like to, any advice? yes! don't write offtopic answers and don't get abusive. if you follow these 2 basic rules 99,98% of your posts will not be deleted i currently only see one cleaned up thread from you. that was on the topic "crack my password on wallet.dat". do you mean that or is there something else that has been deleted?
I see, so this is what made the mod delete one of my post making sure to note this one, Using Loyce.club, I could find the deleted post. http://loyce.club/archive/posts/5409/54096393.htmlI think the reason is that you had made two posts in a row. You had made a post on 21:39:04 (CET), March 25 Then you made another post in a row on 02:47:15 (CET), March 26 Moderators deleted the first post. Source: Loyce.clubMaking multiple posts in a row is against the rules.
|
|
|
How is it possible to delete irrelevant post or reply to one who'm I talking to?
The moderator delete one of my post how should I put myself to justify my action thus enhance to this field all of I'm asking was the backbone of this core yet been deleted somehow, without any notices is it justifiable?
any advice?
|
|
|
I've found a ckey to wallet.dat opening using notepad and found KeyA to every public address what does this KeyA mean is it the privatekey of Publickey corresponds to that address this KeyA I'm pointing is gibberish as it's sound is there a way to decode this using some editor or software python etc,,...
|
|
|
this is what I've seen on my wallet so far any indications? ( name"1HwYQZ82uAitbV8gfVuWXrtwFRhLA2uWQ2 ( name"15mXhu5uNRfHTKofoThesNpUQFKhoHYewq C 0・タツMⅵ2ネ・8_s彩ホzナ ・rカ鴈カノィ[qd#・Hミ叟・F・f・ヒ・ n・ mkey 1 0qムG・ ヨエ.ア釗g2+`蠇w交フ・Zp・睡pラM・秧Xヘkシc' ckey!貼ョQ゙0s0キ7ア・・・evvJ ョ・「・ 1 0肯#赦・・・ケ゚P・;・Oh劦組Rヤ`ハqワ瘍~:」マ' ckey!匤風^1i QViD・フ"QオリU傅評カ 1 0ネa=ノエ・サ淕&_・俎段Q・ 昤J郛]・・Jオチ ・゚BV・' ckey!肢タCユサ旡ツCソ鯰6pB・C偂ハ| 1 0vy・p・・ュロ便「瀾ムY・yヤTオ[M*・・ J
|
|
|
I've really appreciate the digging to the rabbit hole and helping me, I'll be locking the thread now! From doing a bit of digging with core it seems you can decide whether you want to use a wallet file. Or a wallet folder. I think purpose is a newer version of the wallet name parameter I can see when I put the getwalletinfo in my version of core. If you specify a folder instead of a file the purpose or name field will allow you to work out which wallet you're viewing information for.
|
|
|
|