Bitcoin Forum
November 17, 2024, 10:23:18 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [SOLVED] 0.1 BSV Reward - Help needed recovering Blockchain.info backup file  (Read 109 times)
fedexpress (OP)
Newbie
*
Offline Offline

Activity: 13
Merit: 2


View Profile
May 16, 2021, 04:41:12 AM
Last edit: May 16, 2021, 07:33:13 AM by fedexpress
Merited by ABCbits (1), HCP (1)
 #1

Hi guys,

I have my old blockchain.info wallet backup file "wallet.aes.json"

Here is some part of the file content:
Code:
{"pbkdf2_iterations":5000,"version":2,"payload":"l5wAmAZrWx32WXXvIu6bwjDKhgDDo+yIXkKYt8zfalwlW/6sdFK/NeZCUrIxmAFZT5DIWXV0OE7kc+wHwjn2Nz/rIlS0tJHNUaCQ0cP1HMYhkjqRKghsn5epEoPt/4lAPA=="}

I know my primary password, and part of my secondary password.

I need a tool that can iterate between characters quickly (password is like ~15-20 chars long and I have the first 11 characters, I know it is alphanumeric only, all lowercase)

I have downloaded "btcrecover", ran the tests using this command in Terminal (I don't use Windows OS):
Code:
python run-all-tests.py

The tests are okay, but I'm not sure on how to proceed now?

I tried the script on "extract-scripts/extract-blockchain-second-hash.py" and after entering my correct primary password, here is the output:

Code:
Blockchain second password hash, salt, and iter_count in base64:
...

Now do I use this second password hash somehow or I need to use another method with my "wallet.aes.json"?
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4361

<insert witty quote here>


View Profile
May 16, 2021, 05:05:14 AM
Merited by ABCbits (2), OgNasty (1)
 #2

Try reading the instructions here: https://btcrecover.readthedocs.io/en/latest/Extract_Scripts/#blockchaincom-second-passwords

You basically just run btcrecover with the --data-extract option instead of the --wallet option and specify all the other options (tokenlist, typos etc)... refer: https://btcrecover.readthedocs.io/en/latest/TUTORIAL/ for instructions on the various options you can use for trying to bruteforce the password... when prompted, input the second password "hash" that was extracted and the script will then attempt to bruteforce the password.

There is a blockchain.com specific example here: https://btcrecover.readthedocs.io/en/latest/Usage_Examples/2020-05-08_Recovering_Blockchain_Wallet_Passwords/Example_Recovering_Blockchain_Wallet_Passwords/

and a youtube tutorial here: https://www.youtube.com/watch?v=eS0VUl3w69Y&list=PL7rfJxwogDzmd1IanPrmlTg3ewAIq-BZJ&index=11

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
fedexpress (OP)
Newbie
*
Offline Offline

Activity: 13
Merit: 2


View Profile
May 16, 2021, 05:11:41 AM
 #3

Try reading the instructions here: https://btcrecover.readthedocs.io/en/latest/Extract_Scripts/#blockchaincom-second-passwords

You basically just run btcrecover with the --data-extract option instead of the --wallet option and specify all the other options (tokenlist, typos etc)... refer: https://btcrecover.readthedocs.io/en/latest/TUTORIAL/ for instructions on the various options you can use for trying to bruteforce the password... when prompted, input the second password "hash" that was extracted and the script will then attempt to bruteforce the password.

There is a blockchain.com specific example here: https://btcrecover.readthedocs.io/en/latest/Usage_Examples/2020-05-08_Recovering_Blockchain_Wallet_Passwords/Example_Recovering_Blockchain_Wallet_Passwords/

and a youtube tutorial here: https://www.youtube.com/watch?v=eS0VUl3w69Y&list=PL7rfJxwogDzmd1IanPrmlTg3ewAIq-BZJ&index=11

Thank you very much for the guides, could you please Private Message me your "Bitcoin SV" Address?
I was initially planning to pay a 0.1 BSV reward for help here. (not much I know)
fedexpress (OP)
Newbie
*
Offline Offline

Activity: 13
Merit: 2


View Profile
May 16, 2021, 06:26:15 AM
 #4

Try reading the instructions here: https://btcrecover.readthedocs.io/en/latest/Extract_Scripts/#blockchaincom-second-passwords

You basically just run btcrecover with the --data-extract option instead of the --wallet option and specify all the other options (tokenlist, typos etc)... refer: https://btcrecover.readthedocs.io/en/latest/TUTORIAL/ for instructions on the various options you can use for trying to bruteforce the password... when prompted, input the second password "hash" that was extracted and the script will then attempt to bruteforce the password.

There is a blockchain.com specific example here: https://btcrecover.readthedocs.io/en/latest/Usage_Examples/2020-05-08_Recovering_Blockchain_Wallet_Passwords/Example_Recovering_Blockchain_Wallet_Passwords/

and a youtube tutorial here: https://www.youtube.com/watch?v=eS0VUl3w69Y&list=PL7rfJxwogDzmd1IanPrmlTg3ewAIq-BZJ&index=11

Thanks again, I just sent the BSV to your address. Wink
bitterguy28
Full Member
***
Offline Offline

Activity: 2198
Merit: 182


“FRX: Ferocious Alpha”


View Profile WWW
May 17, 2021, 11:33:05 AM
 #5

I guess this needs to be locked since you already recovered your funds mate.

Anyway Congrats and hope next time you will be more careful to Keep and hold your passwords.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!