GoldTiger69
|
|
November 15, 2017, 06:57:29 AM |
|
To geraldfrank: Now that you have the password, you can run $ pywallet.py --wallet=<your_wallet_file> --passphrase=<your_password> --dumpwallet Hope that helps.
|
|
|
|
porto-pok
Newbie
Offline
Activity: 42
Merit: 0
|
|
November 15, 2017, 09:08:13 AM |
|
Its impossible to do that
|
|
|
|
9kek
Member
Offline
Activity: 109
Merit: 21
|
|
November 27, 2017, 06:06:01 PM |
|
did someone found it?
|
|
|
|
pecker8000
Newbie
Offline
Activity: 6
Merit: 0
|
|
December 06, 2017, 04:21:36 AM |
|
Here is the information for the address
{ "addr": "12KGAcU47BhCSQJCN9r2dHAvhDALMVsJkk", "balance": "15508294", "compressed": true, "encrypted_privkey": "f912462631805fb602ad6ce5763d6394f25d6374e71a55be1dfe3948bc1f483a256685238ce6459 7ff0afe69b03a8183", "label": "Slush", "pubkey": "037023ec20116784122552ca485e7459a63228cb067e96c556e30a3b1f8c316a45", "reserve": 0 },
EDIT: Was told that this information is necessary, so here you go
"mkey": { "encrypted_key": "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac6 1b5b03c582d724214", "nDerivationIterations": 80062, "nDerivationMethod": 0, "nID": 1, "otherParams": "", "salt": "d07e66c2606ae4fc" },
There is also another address within the wallet that has 3 btc that i am hoping to recover. I will give the person who produces the successful password 0.5 in addition to the address above, but I guess youll have to trust me on following through.
Crack this wallet and feel free to take the money, but please message me the password! Or post it here
I forgot the password i used back in 2013 and im dying to figure it out so i can take funds from the other addresses in the wallet. I really don't remember anything about the password but it wasnt very long
Also, does anyone have any time approximations for bruteforcing according to password length? Such as
5 char = xx min 6 char = xx min 7 char = xx min and so on. doesnt have to be exact in any sense im just trying to wrap my mind around how long it would take (assuming gpu acceleration)
Mods, if this is in the wrong subforum feel free to move it!
Could u RUN on btcrecover and share "Bitcoin Core encrypted master key, salt, iter_count, and crc in base64: generated from wallet.dat"
|
|
|
|
ncsupanda
Legendary
Offline
Activity: 1628
Merit: 1012
|
|
December 07, 2017, 12:35:28 PM |
|
Reposting here for anyone trying this with more hardware than I have. I'm sure there are a lot of people here trying to use btcrecover to attempt this on their own - and surely there are more people stuck on extracting some information from what you've provided. If using btcrecover the following information is needed for --data-extract. Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64: YmM64LYAAfzSnXMMKY3nU446Bwnk/bc42KxhtbA8WC1yQhTQfmbCYGrk/L44AQAA5o2b
You can generate this by editing the extract scripts included in that tool. Excerpt from extract-bitcoincore-mkey-from-pywallet.py.
encrypted_master_keytest = "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac61b5b03c582d724214" #Hardcode from OP saltnumber = "d07e66c2606ae4fc" #Hardcode from OP
encrypted_master_key = base64.b16decode(encrypted_master_keytest, True) # True means allow lowercase salt = base64.b16decode(saltnumber, True) iter_count = int(80062)
print("Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64:", file=sys.stderr)
# Only include the last two AES blocks (last 32 bytes) of the 48-byte encrypted master key bytes = b"bc:" + encrypted_master_key[-32:] + salt + struct.pack("<I", iter_count) crc_bytes = struct.pack("<I", zlib.crc32(bytes) & 0xffffffff)
print(base64.b64encode(bytes + crc_bytes))
If you've made it this far, then the issue is likely your amount of computing power; without either having a large amount of GPUs or a more defined tokens list / logic, then you cannot move forward. You can try a command such as the following: C:\python27\python btcrecover.py --data-extract --enable-gpu --tokenlist tokens.txt --typos 3 --typos-capslock --typos-swap --typos-repeat --pause
Hopefully we can help recover this for the OP. If I've made any mistakes above please let me know. Thanks. EDIT: Adding link to the btcrecover github as credit is due to them. https://github.com/gurnec/btcrecover
|
|
|
|
Mikanoshi
|
|
December 09, 2017, 12:43:01 PM |
|
Just wait for quantum computers to recover lost wallets 1 BTC will cost fortune then, look at it as a forced hodl.
|
|
|
|
bite
Newbie
Offline
Activity: 31
Merit: 0
|
|
December 09, 2017, 09:51:13 PM |
|
|
|
|
|
faithupgrade
Sr. Member
Offline
Activity: 475
Merit: 253
ARCS - A New World Token
|
|
December 09, 2017, 11:58:05 PM |
|
I wish people who can crack that would be honest to return the money to you. Never heard a successful btc address hacking. Here is the information for the address
{ "addr": "12KGAcU47BhCSQJCN9r2dHAvhDALMVsJkk", "balance": "15508294", "compressed": true, "encrypted_privkey": "f912462631805fb602ad6ce5763d6394f25d6374e71a55be1dfe3948bc1f483a256685238ce6459 7ff0afe69b03a8183", "label": "Slush", "pubkey": "037023ec20116784122552ca485e7459a63228cb067e96c556e30a3b1f8c316a45", "reserve": 0 },
EDIT: Was told that this information is necessary, so here you go
"mkey": { "encrypted_key": "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac6 1b5b03c582d724214", "nDerivationIterations": 80062, "nDerivationMethod": 0, "nID": 1, "otherParams": "", "salt": "d07e66c2606ae4fc" },
There is also another address within the wallet that has 3 btc that i am hoping to recover. I will give the person who produces the successful password 0.5 in addition to the address above, but I guess youll have to trust me on following through.
Crack this wallet and feel free to take the money, but please message me the password! Or post it here
I forgot the password i used back in 2013 and im dying to figure it out so i can take funds from the other addresses in the wallet. I really don't remember anything about the password but it wasnt very long
Also, does anyone have any time approximations for bruteforcing according to password length? Such as
5 char = xx min 6 char = xx min 7 char = xx min and so on. doesnt have to be exact in any sense im just trying to wrap my mind around how long it would take (assuming gpu acceleration)
Mods, if this is in the wrong subforum feel free to move it!
|
|
|
|
ncsupanda
Legendary
Offline
Activity: 1628
Merit: 1012
|
|
December 10, 2017, 05:23:03 AM |
|
I wish people who can crack that would be honest to return the money to you. Never heard a successful btc address hacking. -snipped by ncsupanda-
How can they get the funds? You still require access to the actual wallet.dat file after you figure out the password.
|
|
|
|
Mikanoshi
|
|
December 14, 2017, 12:11:41 AM |
|
How can they get the funds? You still require access to the actual wallet.dat file after you figure out the password.
You decrypt the private key, it's all you need.
|
|
|
|
someoldcoins
|
|
December 16, 2017, 12:52:56 PM |
|
can we use bitcoin wallet hash "$bitcoin$96" in --wallet=<your_wallet_file> option ?
|
|
|
|
Cobalt9317
Copper Member
Sr. Member
Offline
Activity: 434
Merit: 278
Offering Escrow 0.5 % fee
|
|
December 16, 2017, 11:14:58 PM |
|
Password found: 'xxxxxxxxxxxxxxxxxxxxxx'
This is the closest way to gain access to this bitcoin, that never been circulated since 2013. The password will become more difficult if you add symbols to your password instead of just numbers, letters or combination of two. P.S I will save all the information here for the future, who knows I might be able to crack this when the time is right.
|
|
|
|
pecker8000
Newbie
Offline
Activity: 6
Merit: 0
|
|
December 19, 2017, 01:32:06 PM |
|
Hello Butense, Please run C:\btcrecover-master\extract-scripts>extract-bitcoincore-mkey.py c:\btcrecover-m aster\wallet.dat Partial Bitcoin Core encrypted master key, salt, iter_count, and crc in base64: YmxxxxxxqaVIxxxxxxxx6PjjUxxxxxxh/Jaxxxxxx8x/GCitxxxxxxxxDxxxxxxx21
and share the data
At least let me too try decrypting the password.
Even you know as it still require access to the actual wallet.dat file after you figure out the password as told by @ncsupanda
|
|
|
|
baradfo
|
|
December 19, 2017, 04:44:02 PM |
|
I'm surprised this hasn't been resolved yet.
|
|
|
|
crypto_bee
Newbie
Offline
Activity: 2
Merit: 0
|
|
January 11, 2018, 07:01:02 PM Last edit: January 11, 2018, 10:48:15 PM by crypto_bee |
|
It is impossible, it would take 85 days with a proper mining rig (6 x rx580) to brute force 8 characters long password consisting of only lower case letters.
|
|
|
|
theRealQtip
Newbie
Offline
Activity: 3
Merit: 0
|
|
January 16, 2018, 11:10:11 PM |
|
I'm getting about 109.1 kH/s at the moment.. I'm going to spend some cycles on this..
|
|
|
|
Cereberus
Legendary
Offline
Activity: 910
Merit: 1000
|
|
January 17, 2018, 09:19:14 PM |
|
No one will be successful brute forcing it, even quantum computers, that is a legend to keep us afraid of the government agencies. During February of last year I have post a .RAR file with a 65 character password and many people here claimed to decrypting it in no time, yet it is almost one year and no one haven't.
|
|
|
|
bigvito19
|
|
January 17, 2018, 09:29:09 PM |
|
65 characters?
|
|
|
|
Cereberus
Legendary
Offline
Activity: 910
Merit: 1000
|
|
January 17, 2018, 09:33:26 PM |
|
65 characters? Yes and the password make sense only to me. No dictionary brute force program can decrypt it and honestly since I am years ahead compared to even quantum computers in my brain(password only exist in my brain), chances are no one will ever do, at least not in this lifetime.
|
|
|
|
JamesR1
|
|
January 17, 2018, 09:36:37 PM |
|
Here is the information for the address
{ "addr": "12KGAcU47BhCSQJCN9r2dHAvhDALMVsJkk", "balance": "15508294", "compressed": true, "encrypted_privkey": "f912462631805fb602ad6ce5763d6394f25d6374e71a55be1dfe3948bc1f483a256685238ce6459 7ff0afe69b03a8183", "label": "Slush", "pubkey": "037023ec20116784122552ca485e7459a63228cb067e96c556e30a3b1f8c316a45", "reserve": 0 },
EDIT: Was told that this information is necessary, so here you go
"mkey": { "encrypted_key": "3ce2900d6c2df58a1cfa9ea1755a1599e0b60001fcd29d730c298de7538e3a0709e4fdb738d8ac6 1b5b03c582d724214", "nDerivationIterations": 80062, "nDerivationMethod": 0, "nID": 1, "otherParams": "", "salt": "d07e66c2606ae4fc" },
There is also another address within the wallet that has 3 btc that i am hoping to recover. I will give the person who produces the successful password 0.5 in addition to the address above, but I guess youll have to trust me on following through.
Crack this wallet and feel free to take the money, but please message me the password! Or post it here
I forgot the password i used back in 2013 and im dying to figure it out so i can take funds from the other addresses in the wallet. I really don't remember anything about the password but it wasnt very long
Also, does anyone have any time approximations for bruteforcing according to password length? Such as
5 char = xx min 6 char = xx min 7 char = xx min and so on. doesnt have to be exact in any sense im just trying to wrap my mind around how long it would take (assuming gpu acceleration)
Mods, if this is in the wrong subforum feel free to move it!
I will try to do my best but honesty it is difficult as always nothing impossible under the sun . feedback later
|
|
|
|
|