Bitcoin Forum
November 13, 2024, 08:01:01 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: I have pasted my wallet.dat base64-encoded, crack it and the contents are yours  (Read 3432 times)
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 01:45:06 AM
 #21

Oh, if you crack the correct one i'll send 1BTC to the address in the wallet
sveetsnelda
Hero Member
*****
Offline Offline

Activity: 642
Merit: 500


View Profile
September 02, 2011, 01:46:38 AM
 #22

*That* looks better.  Now let's take a look...  Cheesy

You have the plaintext, don't do the obvious to crack it
Oh.  For some reason I was thinking that he posted a 2nd one (like the first one was just a teaser).

14u2rp4AqFtN5jkwK944nn741FnfF714m7
sveetsnelda
Hero Member
*****
Offline Offline

Activity: 642
Merit: 500


View Profile
September 02, 2011, 01:47:16 AM
 #23

Oh, if you crack the correct one i'll send 1BTC to the address in the wallet
Are they two separate wallets, then?

14u2rp4AqFtN5jkwK944nn741FnfF714m7
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 01:47:57 AM
 #24

Oh, if you crack the correct one i'll send 1BTC to the address in the wallet
Are they two separate wallets, then?

No, hence my request that you not do the obvious to crack it.
Tell me how to crack it without having the plaintext and i'll send you 1BTC.
fcmatt
Legendary
*
Offline Offline

Activity: 2072
Merit: 1001


View Profile
September 02, 2011, 01:50:39 AM
 #25

I think I am a bit confused now.

The first was simply based64 encoded. The person who won decoded it and earned the btc.

Now you have a second file which when decoded is obviously not a wallet.dat file straight away.

Is this the same wallet.dat file but encrypted with a one time pad using urandom?
sveetsnelda
Hero Member
*****
Offline Offline

Activity: 642
Merit: 500


View Profile
September 02, 2011, 01:51:17 AM
 #26

Well...  If urandom was used, it's certainly possible to crack (especially since the header of the file is the same between wallets).  That'd give you some possibilities of where the seed started.  However, it seems that different versions of Unix/Linux/BSD have different implementations of pseudo-random number generation.  We could go through them all, I guess...

14u2rp4AqFtN5jkwK944nn741FnfF714m7
fcmatt
Legendary
*
Offline Offline

Activity: 2072
Merit: 1001


View Profile
September 02, 2011, 01:53:25 AM
 #27

Well...  If urandom was used, it's certainly possible to crack (especially since the header of the file is the same between wallets).  That'd give you some possibilities of where the seed started.  However, it seems that different versions of Unix/Linux/BSD have different implementations of pseudo-random number generation.  We could go through them all, I guess...

I was thinking that also. Freebsd does not even have urandom.. it just:

> ls -al /dev/ | grep ran
crw-rw-rw-   1 root     wheel       0,  11 Sep  8  2009 random
lrwxr-xr-x   1 root     wheel            6 Sep  8  2009 urandom -> random
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 01:54:04 AM
 #28

Well...  If urandom was used, it's certainly possible to crack (especially since the header of the file is the same between wallets).  That'd give you some possibilities of where the seed started.  However, it seems that different versions of Unix/Linux/BSD have different implementations of pseudo-random number generation.  We could go through them all, I guess...

To win the bounty you must present an algorithm.
The kernel version: 2.6.32-5
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 01:56:38 AM
 #29

By the way, after this one is cracked the next bounty will be 10BTC for one encrypted using the REAL entropy source.
wolftaur
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
September 02, 2011, 01:56:48 AM
 #30

Well...  If urandom was used, it's certainly possible to crack (especially since the header of the file is the same between wallets).  That'd give you some possibilities of where the seed started.  However, it seems that different versions of Unix/Linux/BSD have different implementations of pseudo-random number generation.  We could go through them all, I guess...

To win the bounty you must present an algorithm.
The kernel version: 2.6.32-5

And when someone earns the bounty, everyone with the base64-decoded version tries spending the bounty first. Smiley

"MOOOOOOOM! SOME MYTHICAL WOLFBEAST GUY IS MAKING FUN OF ME ON THE INTERNET!!!!"
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 01:59:22 AM
 #31

Well...  If urandom was used, it's certainly possible to crack (especially since the header of the file is the same between wallets).  That'd give you some possibilities of where the seed started.  However, it seems that different versions of Unix/Linux/BSD have different implementations of pseudo-random number generation.  We could go through them all, I guess...

To win the bounty you must present an algorithm.
The kernel version: 2.6.32-5

And when someone earns the bounty, everyone with the base64-decoded version tries spending the bounty first. Smiley
No, because the next bounty will be in a new wallet - only the one who cracks it will get it.
For this one, i'll send the 1BTC when the winner agrees - they can then pay it out themselves to ensure it doesn't get stolen - plus it'll be fun to watch that bit anyway Wink
fcmatt
Legendary
*
Offline Offline

Activity: 2072
Merit: 1001


View Profile
September 02, 2011, 02:11:29 AM
 #32

I am sitting here thinking what would he use for the seed value... his bitcoin address? his username?
There must be a clue I am not thinking of in his posts. To sit here and try to brute force it does not
seem like a valid plan of action.
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 02:15:12 AM
 #33

I am sitting here thinking what would he use for the seed value... his bitcoin address? his username?
There must be a clue I am not thinking of in his posts. To sit here and try to brute force it does not
seem like a valid plan of action.

What would I use?
I use whatever the hell last went into the kernel entropy pool - and trust me, it's cycled a lot Wink
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 02:17:27 AM
 #34

I'll help you all out.
It was somewhere between 128 and 190 bits long.
wolftaur
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
September 02, 2011, 06:37:31 AM
 #35

I'll help you all out.
It was somewhere between 128 and 190 bits long.

That's about as useful as the United States Congress.

"MOOOOOOOM! SOME MYTHICAL WOLFBEAST GUY IS MAKING FUN OF ME ON THE INTERNET!!!!"
Gareth Nelson (OP)
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 02, 2011, 10:15:45 AM
 #36

I'll help you all out.
It was somewhere between 128 and 190 bits long.

That's about as useful as the United States Congress.

It's all I know based on how much entropy that box drains.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!