Bitcoin Forum
June 19, 2018, 03:40:57 AM *
News: Latest stable version of Bitcoin Core: 0.16.1  [Torrent]. (New!)
 
   Home   Help Search Donate Login Register  
Pages: « 1 [2] 3 4 5 »  All
  Print  
Author Topic: Crack my bitcoin wallet address and get 0.155 btc + 0.5BTC  (Read 9515 times)
ImHash
Hero Member
*****
Offline Offline

Activity: 658
Merit: 500

segwit=lower fees


View Profile
April 24, 2017, 11:31:02 PM
 #21

There is a service thread called lost password recovery for wallets or similar to that, if you search in forum "recover lost wallet password" there is a newbie or member I think with green trust, you send them partial info about your wallet and they will find your password.
1529379657
Hero Member
*
Offline Offline

Posts: 1529379657

View Profile Personal Message (Offline)

Ignore
1529379657
Reply with quote  #2

1529379657
Report to moderator
1529379657
Hero Member
*
Offline Offline

Posts: 1529379657

View Profile Personal Message (Offline)

Ignore
1529379657
Reply with quote  #2

1529379657
Report to moderator
1529379657
Hero Member
*
Offline Offline

Posts: 1529379657

View Profile Personal Message (Offline)

Ignore
1529379657
Reply with quote  #2

1529379657
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1529379657
Hero Member
*
Offline Offline

Posts: 1529379657

View Profile Personal Message (Offline)

Ignore
1529379657
Reply with quote  #2

1529379657
Report to moderator
Butense
Jr. Member
*
Offline Offline

Activity: 42
Merit: 0


View Profile
April 25, 2017, 12:19:17 AM
 #22

I've reached out to a couple recovery services too.  Btw, all i care about is getting the password, doesn't matter who came up with it or from where.  If you come up with it indirectly, that person will get the bounty and they can then forward it part of it to whoever actually cracked it.  I may raise it to 1btc soon

Like my posts:1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
Testing Laptops with: Radeon 6750M & 6770M || 150 Mhash/s
Feeling Generous?1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
bets21
Member
**
Offline Offline

Activity: 128
Merit: 10


View Profile
April 25, 2017, 06:33:33 AM
 #23

weird for me,...OP want someone cracking the address and pay 0.5 btc for balance $194 in the wallet ? pay $600 for $194
Checlets
Full Member
***
Offline Offline

Activity: 179
Merit: 100


View Profile
April 25, 2017, 06:58:28 AM
 #24

weird for me,...OP want someone cracking the address and pay 0.5 btc for balance $194 in the wallet ? pay $600 for $194


The part that we would gain access to has 0.155 btc there's another part that he'll recover 3 btc from so yeah the initial .155 btc + .5 btc is .655 btc he's offering to pay to be able to keep the other 2.5btc
leonair
Sr. Member
****
Offline Offline

Activity: 420
Merit: 275

★Nibyx.com★


View Profile
April 25, 2017, 02:07:09 PM
 #25

I knew some encrypted wallet that has been retrieved again with the help of a script but can I get some bounty too if he really helps you with this? What version of bitcoin qt are using way back in 2013?

lighpulsar07
Sr. Member
****
Offline Offline

Activity: 392
Merit: 250



View Profile WWW
April 25, 2017, 03:03:30 PM
 #26

Have you try all possible passwords that you can think? Is your password have birthdate, symbols, case sensitive letters like this: LiGhPuLsAr07? Try to search you old passwords list in your computer i might be there or try to remember the most used password you used in 2013 and also how long is your password to bruteforce it? how many characters?

EDIT: did you save your wallet password on your computer?



              ▄▄              ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
             ████         ▄▄██████████████████
            ██████       █████████████████████
           ████████     ██████████████████████
          ██████████   ▐███████▀
         ████████████  ▐███████▄
        ██████████████  ████████████████████████▄
       ████████▀███████  ██████████████████████████
      ████████   ███████  ▀▀████████████████████████
     ████████     ███████                   ▀███████▌
    ████████       ███████                   ███████▌
   ████████▄▄▄▄▄▄▄  ███████▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄████████
  █████████████████  ██████████████████████████████
 ███████████████████  ███████████████████████████▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

█ █
█ █
█ █

█ █
█ █
█ █




                 ▄████▄▄    ▄
██             ████████████▀
████▄         █████████████▀
▀████████▄▄   █████████████
▄▄█████████████████████████
██████████████████████████
  ▀██████████████████████
   █████████████████████
    ▀█████████████████▀
      ▄█████████████▀
▄▄███████████████▀
   ▀▀▀▀▀▀▀▀▀▀▀





    ███▄             ▄███
   ██████▄█████████▄██████
   ███████████████████████
  █████████████████████████
 ███████████████████████████
 █████▀▀             ▀▀█████
▐████   ▄██▄     ▄██▄   ████▌
 ███▌   ████     ████   ▐███
  ▀██▄   ▀▀       ▀▀   ▄██▀
    ▀███▄▄▄▄▄▄▄▄▄▄▄▄▄███▀
       ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀





                      ▄▄████
                ▄▄▄████████▌
          ▄▄▄███████▀▄█████
     ▄▄█████████▀▀ ▄██████▌
▄▄███████████▀  ▄█████████
 ▀▀▀█████▀    ▄██████████▌
       ██   █████████████
        █▄ █████████████▌
        ▐█▄███▀▀████████
         ███▀    ▀▀████▌
                    ▀▀█





▄                ▄▄
████▄▄          ██████▄▄
████████▌     ▄███████████
████████▌█   ████████████▄
████████▌██▄▀██████████▀▄█
████████▌████▀████████ ███
████████▌█████▄█████▀▄████
████████▌ ▀▀███▄▀██▀██████
████████▌      ▀▀  ███████
  ▀█████▌          ▀▀█████
      ▀▀▌              ▀▀█
ncsupanda
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
April 25, 2017, 08:16:02 PM
 #27

I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover
AppleBTC
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
April 26, 2017, 07:49:08 AM
 #28

If someone manage to crack open the wallet, i think that person would just withdraw all the bitcoin out of the wallet.
SopaXT
Full Member
***
Offline Offline

Activity: 163
Merit: 109


View Profile
April 26, 2017, 01:03:45 PM
 #29

Could you create a wallet with one of the passphrases given as example, so that I can test my bruteforce script (please publish it in the same format)? Thanks.

ncsupanda
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
April 26, 2017, 02:17:10 PM
 #30

If someone manage to crack open the wallet, i think that person would just withdraw all the bitcoin out of the wallet.

The user hasn't provided the wallet file - the best you can do with this method is discover their password via bruteforce. What you are not doing is calculating their privatekey.
kolloh
Legendary
*
Offline Offline

Activity: 1218
Merit: 1000


View Profile
April 26, 2017, 04:04:27 PM
 #31

I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover

Thanks for the info in this post. It was useful for me as this is the first time I am messing with btcrecover.

It definitely takes quite some time to brute force passwords though especially without any definitive information about what the password might be. I'll see if I can come up with anything though.
Jude Austin
Legendary
*
Offline Offline

Activity: 1124
Merit: 1000


The Real Jude Austin


View Profile WWW
May 24, 2017, 08:19:35 PM
 #32

Any luck?


I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided.
If using btcrecover the following information is needed for --data-extract.


Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:
Code:
YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b

You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.

encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP
saltnumber = "d07e66c2606ae4fc" #Hardcode from OP

encrypted_master_key = base64.b16decode(encrypted_master_keytest, True)  # True means allow lowercase
salt                 = base64.b16decode(saltnumber, True)
iter_count           = int(80062)

print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)

# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key
bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count)
crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)

print(base64.b64encode(bytes + crc_bytes))

If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward.

You can try a command such as the following:
Code:
C:\python27\python btcrecover.py --data-extract --enable-gpu  --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause

Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks.

EDIT:

Adding link to the btcrecover github as credit is due to them.
https://github.com/gurnec/btcrecover

Thanks for the info in this post. It was useful for me as this is the first time I am messing with btcrecover.

It definitely takes quite some time to brute force passwords though especially without any definitive information about what the password might be. I'll see if I can come up with anything though.

Get paid BTC to sign up for free tokens: http://earn.com/judeaustin/referral/?a=d3euriwoffdrlv4b
Butense
Jr. Member
*
Offline Offline

Activity: 42
Merit: 0


View Profile
June 09, 2017, 07:29:13 PM
 #33

anyone have any luck?

Like my posts:1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
Testing Laptops with: Radeon 6750M & 6770M || 150 Mhash/s
Feeling Generous?1JPDMvQdva6g2vXwLkazHHg6PwTmbEdSYn
kolloh
Legendary
*
Offline Offline

Activity: 1218
Merit: 1000


View Profile
June 13, 2017, 05:47:55 PM
 #34

anyone have any luck?

No luck here, unfortunately. It would help if you had a bit more of an idea of the password or its length. Longer passwords are likely not gonna be possible to find without a better idea of the password.
reee
Sr. Member
****
Offline Offline

Activity: 442
Merit: 252


Get Paid to Play your Media on Current


View Profile
June 14, 2017, 08:20:41 PM
 #35

Butense, can you pass your wallet.dat into this script? https://github.com/stricture/hashstack-server-plugin-hashcat/blob/master/scrapers/bitcoin2hashcat.py

syntax should be: bitcoin_hash.py wallet.dat > wallet.hash

then post here the content of the wallet.hash file, it should be a string like this: $bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54$16$1563277210780230$158555$96$628835426818227243334570448571536352510740823233055715845322741625407685873076027233865346542174$66$625882875480513751851333441623702852811440775888122046360561760525

It's useful to pass the info to hashcat in the correct syntax.

However, cracking speed seem very slow with this algorithm, so brute force is impossible (except for very short passwords). The only realistic possibility is try possible variations of the list of password you posted in the first post.

.
▄████████████████████████▄
██████████████████████████
██████████████████████████
██████████████████████████
▀█████████████████████████
   ▀██████████████████████
█▄▄   ▀███████████████████
████▄▄   ▀████████████████
███████▄▄   ▀█████████████
██████████    ▀██████████
███████▀▀        ▀███████
████▀▀              ▀████
█▀▀                    ▀█
..   █
█  █
█  █
█  █
█  █
█  █
█  █
   █
   Just Press Play
Spotify
YouTube
Soundcloud


8Tracks
Radio
Podcast

█  █
█  █
█  █
█  █
█  █
█  █
.
.
GET IN TOUCH
Telegram
.
ANN Thread
.
reee
Sr. Member
****
Offline Offline

Activity: 442
Merit: 252


Get Paid to Play your Media on Current


View Profile
June 14, 2017, 08:32:49 PM
 #36

Question: would it be feasible to crack an 8 char password given a-z A-Z 0-9?  I'm just curious, i don't remember the actual length. 

I tried it with hashcat, it says that extimated time is 3years and 61 days, however i'm using a laptop GPU with an hashpower on this algorithm of 110 H/s. Probabiy a modern desktop GPU can reach 1000 H/s or something similar. So, if your password is really 8 char or lower, it would take some month with a good GPU, and probably a few week/day if you use some rack of GPU (amazon offers something similar). But if your password is something like 10 char it would take many longer.

.
▄████████████████████████▄
██████████████████████████
██████████████████████████
██████████████████████████
▀█████████████████████████
   ▀██████████████████████
█▄▄   ▀███████████████████
████▄▄   ▀████████████████
███████▄▄   ▀█████████████
██████████    ▀██████████
███████▀▀        ▀███████
████▀▀              ▀████
█▀▀                    ▀█
..   █
█  █
█  █
█  █
█  █
█  █
█  █
   █
   Just Press Play
Spotify
YouTube
Soundcloud


8Tracks
Radio
Podcast

█  █
█  █
█  █
█  █
█  █
█  █
.
.
GET IN TOUCH
Telegram
.
ANN Thread
.
Mikanoshi
Sr. Member
****
Offline Offline

Activity: 434
Merit: 252


Insane In The Blockchain ⚠


View Profile WWW
June 15, 2017, 01:53:40 AM
 #37

I can reach 10500 P/s in btcrecover on my GTX 1080, but even with an incomplete set of chars from the example passwords [Fromage243Md96?P15hyqz7TiltQus8!fjpOknwc0] it will take years to crack 8 chars.
Hashcat gives 8000 P/s (but not for this hash, I was trying to crack wallet with 1 BTC and unknown 11 char pwd in it that has 122023 hash iterations, so with 80062 speed should be around 12k P/s).
Longest sample pwd is 17 characters, bruteforcers can't event start bruting such passwords, either something overflows or it eats all the RAM Smiley Good luck bruteforcing that Cheesy

Quote
it says that extimated time is 3years and 61 days
Mine too, which must be incorrect, it should be around 32 years for my charset according to http://calc.opensecurityresearch.com/
a-zA-Z0-9 will take 700 years on 10k P/s.

Session..........: hashcat
Status...........: Running
Hash.Type........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$96$6b6178c1803c946cdc62b2eccfbb121443cf006...0b6573
Time.Started.....: Thu Jun 15 06:34:28 2017 (15 secs)
Time.Estimated...: Sat Aug 15 16:21:23 2020 (3 years, 61 days)
Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8]
Guess.Charset....: -1 Fromage243Md96??P15hyqz7TiltQus8!fjpOknwc0, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:     8006 H/s (85.79ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 0/7984925229121 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/194754273881 (0.00%)
Candidates.#1....: sarinane -> s5F84501
HWMon.Dev.#1.....: Temp: 57c Fan: 33% Util:100% Core:2062MHz Mem:5005MHz Bus:16

abhinav_thakur01
Sr. Member
****
Offline Offline

Activity: 266
Merit: 250



View Profile
June 15, 2017, 12:02:54 PM
 #38

Bruteforcing , dictionary attack or whatever you may try seems to be far away from practical and chances of getting any luck is also less. I generally use third party applications due to which synchronising becomes no longer a problem. However, I will do a research and give it a shot in my spare time.
rishab2019
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
June 20, 2017, 12:29:55 PM
 #39

Hello bro,

I can help you regarding recovery of the wallet.email me:-rishab2019@gmail.com
restypots
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250



View Profile
June 20, 2017, 05:32:17 PM
 #40

looks great like rootOS encrypt developer .Such no any idea to confirming .looking for third party Cheesy
Pages: « 1 [2] 3 4 5 »  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!