Bitcoin Forum
June 23, 2024, 03:08:41 PM *
News: Voting for pizza day contest
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Bitcoin Technical Support / Re: CPU for btcrecover on: February 24, 2020, 05:24:44 AM
I got it!! It worked!! ahhh!!!!!!!!!!!

I was so close, yes I had put together my own custom lists first using excel, then I used the mask function and mask processor.  I created a few hundred million possibilities and they didn't work.  I see my password now, I was extremely close.  For reference, it's not an easy password, it's a long complex password hardcoded in my brain.  I knew there had to be something small that I possibly changed when I created it, but it turns out it wasn't the type of change I was thinking, it was something else.  I created a custom rule set this morning that would have taken a few days to exhaust and still not have found it, now that I see what it is.  It's possible I eventually would have added this variable into the rules, but it wasn't in my mind for the past few days.  So, I was searching online for more info and I found this custom rule set below and it cracked the password within 11 seconds on my 1080ti and all I did was use it in combination with a small master wordlist of what I thought it should be.  Perfect timing too as I was about to order more cards today.

Thanks a ton everyone.  Hashcat is awesome!!

Here is the ruleset I used.  And thank you to the people who created this ruleset.
https://www.notsosecure.com/one-rule-to-rule-them-all/

Just a note to anyone who reads this too, I got the GPU to work in btcrecover as well and it was also fast.  GPU is disabled by default, I didn't realize that.  But hashcat still went through the lists faster.  Both are great.  

I couldn't believe it when 11 seconds later it stopped and said status "Cracked".  Grin Grin
Quote
Session..........: hashcat
Status...........: Cracked
Hash.Name........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$64$~~~~~~~~~~~~~~~~~
Time.Started.....: Sun Dec 22 05:01:32 2019 (11 secs)
Time.Estimated...: Sun Dec 22 05:01:43 2019 (0 secs)
Guess.Base.......: Pipe
Speed.#1.........:     5793 H/s (11.04ms) @ Accel:16 Loops:512 Thr:64 Vec:1
Recovered........: 1/1 (100.00%) Digests

For any other newbs reading this, to get full speed using rules, you are going to need to pipe it.  Read here: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_to_create_more_work_for_full_speed

I used windows and this is the line I entered into cmd as an example:
hashcat.exe --stdout wordlist0.txt -r rules/OneRuleToRuleThemAll.rule | hashcat.exe -m 11300 hash.txt

hash.txt being your extracted wallet hash, of course. make sure there are no spaces in the file.

Shred your wordlists and anything with your info of any part of your pass on it of course in a file shredder program when you are done.



I have the exact same problem that you have resolved. I have used hashcat and extracted the hash string out of my password forgotten bitcoin core wallet.dat file. The extracted hash string is in $bitcoin$64$.........$00 format. I tried to follow your advised method, however it is not working for me. I can give you the hash string, can you please extract the password for me? All i know it is 4+ combination char.

I don't have that much bitcoin in my wallet thus i can compensate you 0.25 bitcoin for your time. Would you please help me?


Thanks.

Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!