Bitcoin Forum
November 24, 2017, 05:40:53 PM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 [2] 3 4 »  All
  Print  
Author Topic: Crack my bitcoin wallet address and get 0.155 btc + 0.5BTC  (Read 6571 times)
ImHash
Hero Member
*****
Offline Offline

Activity: 560


MatrixCoin - Creating Bright Future Together


View Profile
April 24, 2017, 11:31:02 PM
 #21

There is a service thread called lost password recovery for wallets or similar to that, if you search in forum "recover lost wallet password" there is a newbie or member I think with green trust, you send them partial info about your wallet and they will find your password.


██████████.......█████......
████████████.....███████.....
███....█████.....███████.....
███....█████.....███████.....
████....██████...█████████....
██████......██████████...█████████....
█████......██████......████....██...█████████....
█████......██████......████....███.███████████...
█████......██████......████....███.███████████...
███...................█████████████████.███████████...
███..███..█████.......██████████.████████████.█████████..
███..█████.......██████████.████████████.█████████..
█████.......██████████.████████████.█████████..
██████......███...███████████...██████████.
██████......███...███████████...██████████.
██████......███...███████████...██████████.
██████......██.....█████████.....██████████
██████████.....█████████.....██████████
██████████.....█████████.....██████████
   
██
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █

█  ██  █

█  ██  █

█  ██  █

█  ██  █

██
   
██
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █
█  ██  █

█  ██  █

█  ██  █

█  ██  █

█  ██  █

██
   
➤  TWITTER
➤  FACEBOOK
➤  INSTAGRAM
1511545253
Hero Member
*
Offline Offline

Posts: 1511545253

View Profile Personal Message (Offline)

Ignore
1511545253
Reply with quote  #2

1511545253
Report to moderator
1511545253
Hero Member
*
Offline Offline

Posts: 1511545253

View Profile Personal Message (Offline)

Ignore
1511545253
Reply with quote  #2

1511545253
Report to moderator
Join ICO Now A blockchain platform for effective freelancing
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1511545253
Hero Member
*
Offline Offline

Posts: 1511545253

View Profile Personal Message (Offline)

Ignore
1511545253
Reply with quote  #2

1511545253
Report to moderator
Butense
Jr. Member
*
Offline Offline

Activity: 41


View Profile
April 25, 2017, 12:19:17 AM
 #22

I've reached out to a couple recovery services too.  Btw, all i care about is getting the password, doesn't matter who came up with it or from where.  If you come up with it indirectly, that person will get the bounty and they can then forward it part of it to whoever actually cracked it.  I may raise it to 1btc soon

Like my posts:1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
Testing Laptops with: Radeon 6750M & 6770M || 150 Mhash/s
Feeling Generous?1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
bets21
Member
**
Offline Offline

Activity: 104


View Profile
April 25, 2017, 06:33:33 AM
 #23

weird for me,...OP want someone cracking the address and pay 0.5 btc for balance $194 in the wallet ? pay $600 for $194
Checlets
Full Member
***
Offline Offline

Activity: 126

Treat me with respect or expect 0 respect.


View Profile
April 25, 2017, 06:58:28 AM
 #24

weird for me,...OP want someone cracking the address and pay 0.5 btc for balance $194 in the wallet ? pay $600 for $194


The part that we would gain access to has 0.155 btc there's another part that he'll recover 3 btc from so yeah the initial .155 btc + .5 btc is .655 btc he's offering to pay to be able to keep the other 2.5btc

⌠»https://www.bitstarz.io/refer/a51e8c73«⌡☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼$$$
☼$$$☼☼☼☼☼☼☼⌠»Dream Big«⌡☼☼☼☼☼☼☼☼☼☼☼☼☼☼$$$☼☼☼☼☼☼☼☼☼
☼☼☼$$$☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼⌠»Win Bigger«⌡☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼
leonair
Sr. Member
****
Offline Offline

Activity: 294


Minimizing a possibility of the token value going


View Profile
April 25, 2017, 02:07:09 PM
 #25

I knew some encrypted wallet that has been retrieved again with the help of a script but can I get some bounty too if he really helps you with this? What version of bitcoin qt are using way back in 2013?


🔒 SafeCrypt.io  █████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
█████
lighpulsar07
Sr. Member
****
Offline Offline

Activity: 350


View Profile WWW
April 25, 2017, 03:03:30 PM
 #26

Have you try all possible passwords that you can think? Is your password have birthdate, symbols, case sensitive letters like this: LiGhPuLsAr07? Try to search you old passwords list in your computer i might be there or try to remember the most used password you used in 2013 and also how long is your password to bruteforce it? how many characters?

EDIT: did you save your wallet password on your computer?

████████████████████████████
████████▄▄████████▄▄████████
█████▄███▀▀██████▀▀███▄█████
██████▀███▄█▄██▄▄████▀██████
████████████████▄▄████████
████████████████████████████
████▄▄███████████████▄████
████▄████████████████▀████
████████████████████████████
████████▀▀▀████▀█▀█████████
██████▄██████████████▄██████
█████▀███▄▄██████▄▄███▀█████
████████▀▀████████▀▀████████
████████████████████████████
Truckcoin










For The Fastest Decentralized Global Market
▬▬     ANN Thread     WhitePaper     Twitter     Facebook     Google+     ▬▬






















ncsupanda
Hero Member
*****
Offline Offline

Activity: 980



View Profile
April 25, 2017, 08:16:02 PM
 #27

I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover

I Buy/Sell WoW Gold and Blizzard games in the US. PM me for more information.
https://www.g2g.com/r/ncsupanda
AppleBTC
Member
**
Offline Offline

Activity: 112


View Profile
April 26, 2017, 07:49:08 AM
 #28

If someone manage to crack open the wallet, i think that person would just withdraw all the bitcoin out of the wallet.
SopaXT
Member
**
Offline Offline

Activity: 85


View Profile
April 26, 2017, 01:03:45 PM
 #29

Could you create a wallet with one of the passphrases given as example, so that I can test my bruteforce script (please publish it in the same format)? Thanks.

If I have helped you, please consider a tip: 1LbrdH6PjbGw9r3GUukbN681E1nEXn7HwP
ncsupanda
Hero Member
*****
Offline Offline

Activity: 980



View Profile
April 26, 2017, 02:17:10 PM
 #30

If someone manage to crack open the wallet, i think that person would just withdraw all the bitcoin out of the wallet.

The user hasn't provided the wallet file - the best you can do with this method is discover their password via bruteforce. What you are not doing is calculating their privatekey.

I Buy/Sell WoW Gold and Blizzard games in the US. PM me for more information.
https://www.g2g.com/r/ncsupanda
kolloh
Legendary
*
Offline Offline

Activity: 1148


View Profile
April 26, 2017, 04:04:27 PM
 #31

I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover

Thanks for the info in this post. It was useful for me as this is the first time I am messing with btcrecover.

It definitely takes quite some time to brute force passwords though especially without any definitive information about what the password might be. I'll see if I can come up with anything though.
Jude Austin
Legendary
*
Offline Offline

Activity: 1094


The Real Jude Austin


View Profile WWW
May 24, 2017, 08:19:35 PM
 #32

Any luck?


I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover

Thanks for the info in this post. It was useful for me as this is the first time I am messing with btcrecover.

It definitely takes quite some time to brute force passwords though especially without any definitive information about what the password might be. I'll see if I can come up with anything though.

Sign up and get a free stock today! - https://share.robinhood.com/judea16
Butense
Jr. Member
*
Offline Offline

Activity: 41


View Profile
June 09, 2017, 07:29:13 PM
 #33

anyone have any luck?

Like my posts:1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
Testing Laptops with: Radeon 6750M & 6770M || 150 Mhash/s
Feeling Generous?1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
kolloh
Legendary
*
Offline Offline

Activity: 1148


View Profile
June 13, 2017, 05:47:55 PM
 #34

anyone have any luck?

No luck here, unfortunately. It would help if you had a bit more of an idea of the password or its length. Longer passwords are likely not gonna be possible to find without a better idea of the password.
reee
Sr. Member
****
Offline Offline

Activity: 417



View Profile
June 14, 2017, 08:20:41 PM
 #35

Butense, can you pass your wallet.dat into this script? https://github.com/stricture/hashstack-server-plugin-hashcat/blob/master/scrapers/bitcoin2hashcat.py

syntax should be: bitcoin_hash.py wallet.dat > wallet.hash

then post here the content of the wallet.hash file, it should be a string like this: $bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54$16$1563277210780230$158555$96$628835426818227243334570448571536352510740823233055715845322741625407685873076027233865346542174$66$625882875480513751851333441623702852811440775888122046360561760525

It's useful to pass the info to hashcat in the correct syntax.

However, cracking speed seem very slow with this algorithm, so brute force is impossible (except for very short passwords). The only realistic possibility is try possible variations of the list of password you posted in the first post.

██████████████████████████████████████████████████████████████████▄   ▄
███████████████████████████████████████████████████████████████████▀▄▀
██████████████████████████████████████████████████████████████████▄▀ ▀▄

  ▄▄▄▄▄▄▄▄      ▄▄▄        ▄▄▄  ▄▄▄           ▄▄▄  ▄▄▄▄▄▄▄▄▄       ▄▄▄
  ██████████▄   ███        ███  ████▄         ███  ███████████▄    ███
  ███     ▀███  ███        ███  ██████▄       ███  ███      ▀███   ███
  ███      ███  ███        ███  ███ ▀███▄     ███  ███        ███  ███
  ███     ▄███  ███        ███  ███   ▀███▄   ███  ███        ███  ███
  ██████████▀   ███▄      ▄███  ███     ▀███▄ ███  ███       ▄███  ███
  ███▀▀▀▀▀       ███▄▄▄▄▄▄███   ███       ▀██████  ███▄▄▄▄▄▄███▀   ███
  ███             ▀████████▀    ███         ▀████  █████████▀▀     ███
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
.
Whitepaper   Twitter   Facebook
Telegram     Medium    Youtube
reee
Sr. Member
****
Offline Offline

Activity: 417



View Profile
June 14, 2017, 08:32:49 PM
 #36

Question: would it be feasible to crack an 8 char password given a-z A-Z 0-9?  I'm just curious, i don't remember the actual length. 

I tried it with hashcat, it says that extimated time is 3years and 61 days, however i'm using a laptop GPU with an hashpower on this algorithm of 110 H/s. Probabiy a modern desktop GPU can reach 1000 H/s or something similar. So, if your password is really 8 char or lower, it would take some month with a good GPU, and probably a few week/day if you use some rack of GPU (amazon offers something similar). But if your password is something like 10 char it would take many longer.

██████████████████████████████████████████████████████████████████▄   ▄
███████████████████████████████████████████████████████████████████▀▄▀
██████████████████████████████████████████████████████████████████▄▀ ▀▄

  ▄▄▄▄▄▄▄▄      ▄▄▄        ▄▄▄  ▄▄▄           ▄▄▄  ▄▄▄▄▄▄▄▄▄       ▄▄▄
  ██████████▄   ███        ███  ████▄         ███  ███████████▄    ███
  ███     ▀███  ███        ███  ██████▄       ███  ███      ▀███   ███
  ███      ███  ███        ███  ███ ▀███▄     ███  ███        ███  ███
  ███     ▄███  ███        ███  ███   ▀███▄   ███  ███        ███  ███
  ██████████▀   ███▄      ▄███  ███     ▀███▄ ███  ███       ▄███  ███
  ███▀▀▀▀▀       ███▄▄▄▄▄▄███   ███       ▀██████  ███▄▄▄▄▄▄███▀   ███
  ███             ▀████████▀    ███         ▀████  █████████▀▀     ███
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
.
Whitepaper   Twitter   Facebook
Telegram     Medium    Youtube
Mikanoshi
Full Member
***
Offline Offline

Activity: 238


Code Monkey 🐵


View Profile WWW
June 15, 2017, 01:53:40 AM
 #37

I can reach 10500 P/s in btcrecover on my GTX 1080, but even with an incomplete set of chars from the example passwords [Fromage243Md96?P15hyqz7TiltQus8!fjpOknwc0] it will take years to crack 8 chars.
Hashcat gives 8000 P/s (but not for this hash, I was trying to crack wallet with 1 BTC and unknown 11 char pwd in it that has 122023 hash iterations, so with 80062 speed should be around 12k P/s).
Longest sample pwd is 17 characters, bruteforcers can't event start bruting such passwords, either something overflows or it eats all the RAM Smiley Good luck bruteforcing that Cheesy

Quote
it says that extimated time is 3years and 61 days
Mine too, which must be incorrect, it should be around 32 years for my charset according to http://calc.opensecurityresearch.com/
a-zA-Z0-9 will take 700 years on 10k P/s.

Session..........: hashcat
Status...........: Running
Hash.Type........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$96$6b6178c1803c946cdc62b2eccfbb121443cf006...0b6573
Time.Started.....: Thu Jun 15 06:34:28 2017 (15 secs)
Time.Estimated...: Sat Aug 15 16:21:23 2020 (3 years, 61 days)
Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8]
Guess.Charset....: -1 Fromage243Md96??P15hyqz7TiltQus8!fjpOknwc0, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:     8006 H/s (85.79ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/7984925229121 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/194754273881 (0.00%)
Candidates.#1....: sarinane -> s5F84501
HWMon.Dev.#1.....: Temp: 57c Fan: 33% Util:100% Core:2062MHz Mem:5005MHz Bus:16

▀     DeepOnion  |  TOR Integrated & Secured  [ Facebook  Telegram  Bitcointalk  Twitter  Youtube  Reddit ]     ▀
Your Anonymity Guaranteed  ★  Your Assets Secured by TOR  ★  Guard Your Privacy!   ❱❱❱ JOIN AIRDROP NOW!
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬  File Authenticity Guaranteed by DeepVault  ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
abhinav_thakur01
Sr. Member
****
Offline Offline

Activity: 266



View Profile
June 15, 2017, 12:02:54 PM
 #38

Bruteforcing , dictionary attack or whatever you may try seems to be far away from practical and chances of getting any luck is also less. I generally use third party applications due to which synchronising becomes no longer a problem. However, I will do a research and give it a shot in my spare time.
rishab2019
Newbie
*
Offline Offline

Activity: 1


View Profile
June 20, 2017, 12:29:55 PM
 #39

Hello bro,

I can help you regarding recovery of the wallet.email me:-rishab2019@gmail.com
restypots
Sr. Member
****
Offline Offline

Activity: 252



View Profile
June 20, 2017, 05:32:17 PM
 #40

looks great like rootOS encrypt developer .Such no any idea to confirming .looking for third party Cheesy
Pages: « 1 [2] 3 4 »  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!