Bitcoin Forum
April 28, 2024, 11:37:52 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Using John the Ripper to crack wallet  (Read 4794 times)
GravePhoenix (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
May 22, 2013, 12:48:31 AM
 #1

So I've been locked out of my wallet because I forgot the passphrase to a secondary walllet and now I have about 140$ in there and am trying to get it out using John the ripper and this code(https://github.com/magnumripper/JohnTheRipper/pull/241) as an external mode to crack it. When I run it though I always get an error stating that the line :include <openssl/evp.h> which is the first line in the code is an invalid identifier. Help greatly appreciated and I might send some coins your way if you prove very useful
1714304272
Hero Member
*
Offline Offline

Posts: 1714304272

View Profile Personal Message (Offline)

Ignore
1714304272
Reply with quote  #2

1714304272
Report to moderator
The network tries to produce one block per 10 minutes. It does this by automatically adjusting how difficult it is to produce blocks.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714304272
Hero Member
*
Offline Offline

Posts: 1714304272

View Profile Personal Message (Offline)

Ignore
1714304272
Reply with quote  #2

1714304272
Report to moderator
1714304272
Hero Member
*
Offline Offline

Posts: 1714304272

View Profile Personal Message (Offline)

Ignore
1714304272
Reply with quote  #2

1714304272
Report to moderator
scintill
Sr. Member
****
Offline Offline

Activity: 448
Merit: 254


View Profile WWW
May 22, 2013, 01:13:03 AM
 #2

The end of that pull request says they fixed some problems and made a new PR.  It seems to be #242.  Then they closed that and said they merged to "bleeding-jumbo" branch.  I'm seeing it here: https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/bitcoin2john.py.

1SCiN5kqkAbxxwesKMsH9GvyWnWP5YK2W | donations
jerboa
Newbie
*
Offline Offline

Activity: 50
Merit: 0



View Profile
May 22, 2013, 07:46:00 AM
 #3

Stealing people's wallets is bad... m'kay.
escrow.ms
Legendary
*
Offline Offline

Activity: 1274
Merit: 1004


View Profile
May 22, 2013, 07:48:59 AM
 #4

Stealing people's wallets is bad... m'kay.

Did you even read his post?
He's trying to recover his wallet's password.
voneiden
Newbie
*
Offline Offline

Activity: 18
Merit: 0


View Profile
May 22, 2013, 08:04:42 AM
 #5

He's trying to recover his wallet's password.

That's what GravePhoenix, first time poster, says he's trying. Better not place your trust so easily on bitcoin world. :-)
jerboa
Newbie
*
Offline Offline

Activity: 50
Merit: 0



View Profile
May 22, 2013, 08:06:13 AM
 #6

Isn't that what you would want to say to get some help with the issue? It can't take that long to try the 50-60 passwords you use normally.
Bunny84
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
May 22, 2013, 09:32:50 AM
 #7

you just need a good mining rig to break a password
Fixatron
Newbie
*
Offline Offline

Activity: 11
Merit: 0



View Profile
May 22, 2013, 11:29:12 AM
 #8

you just need a good mining rig to break a password

And millions and millions of years when it comes to wallets
zeocrash
Full Member
***
Offline Offline

Activity: 134
Merit: 100


View Profile
May 22, 2013, 01:02:52 PM
 #9

you're going to all this length to crack a wallet that has like BTC1.2 in??

you might as well just write that money off. The cost of the time and energy required to crack the wallet will far exceed the amount of money you'll get from the wallet.
Visin
Sr. Member
****
Offline Offline

Activity: 436
Merit: 250


CryptoTalk.Org - Get Paid for every Post!


View Profile
May 22, 2013, 01:17:11 PM
 #10

I tried to do the same using jack the ripper but to no avail, had around 20~ BTC in the wallet, of course back then it was only worth around $200, it would be great to still have it now Wink

 
                                . ██████████.
                              .████████████████.
                           .██████████████████████.
                        -█████████████████████████████
                     .██████████████████████████████████.
                  -█████████████████████████████████████████
               -███████████████████████████████████████████████
           .-█████████████████████████████████████████████████████.
        .████████████████████████████████████████████████████████████
       .██████████████████████████████████████████████████████████████.
       .██████████████████████████████████████████████████████████████.
       ..████████████████████████████████████████████████████████████..
       .   .██████████████████████████████████████████████████████.
       .      .████████████████████████████████████████████████.

       .       .██████████████████████████████████████████████
       .    ██████████████████████████████████████████████████████
       .█████████████████████████████████████████████████████████████.
        .███████████████████████████████████████████████████████████
           .█████████████████████████████████████████████████████
              .████████████████████████████████████████████████
                   ████████████████████████████████████████
                      ██████████████████████████████████
                          ██████████████████████████
                             ████████████████████
                               ████████████████
                                   █████████
CryptoTalk.org| 
MAKE POSTS AND EARN BTC!
🏆
GravePhoenix (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
May 23, 2013, 03:08:58 AM
 #11

Scintill are you saying I should use that python script or update to bleeding-jumbo patch? I fixed the openssl issue only now the .h files he used aren't in any of the directories I looked through. I am using jumbo 1.7.9 currently. And when your as poor as I am you wont stop easily at this. stupid mistake but at least I am learning tons of CS over it  Grin
scintill
Sr. Member
****
Offline Offline

Activity: 448
Merit: 254


View Profile WWW
May 23, 2013, 06:22:45 AM
 #12

Scintill are you saying I should use that python script or update to bleeding-jumbo patch? I fixed the openssl issue only now the .h files he used aren't in any of the directories I looked through. I am using jumbo 1.7.9 currently. And when your as poor as I am you wont stop easily at this. stupid mistake but at least I am learning tons of CS over it  Grin

I don't really know, I haven't used john.  I just noticed the code you originally linked might be outdated since they'd made newer versions.  So you should probably update to bleeding-jumbo and build that.  I just noticed your comment on PR #241 and the response.  The .h file problem is because they are supposed to be generated by the build process.  Are you following the build instructions in doc/INSTALL?  Sometimes when you check code out of git or svn, there is an initial step you have to do to generate some files that aren't kept in the repository, but I'm not seeing any notes about that so maybe it doesn't apply here.

It looks like the python script is a pre-cracking step that extracts out the master key into a standard john input format, and then compiled C code cracks it like normal (I don't know what "normal" is because I haven't used it.)  The cracking code is here.  There's an author email address at the top, and it was only written last month, so the author might be able to help if you have trouble.

If you're new to using this program, I would suggest finding a tutorial that walks you through cracking something easy, get that working with a bleeding-jumbo build, then try plugging in the output of the python script in place of the hash or whatever the tutorial's input was.  Maybe even "crack" a test wallet you know the password to, to make sure it's all working before you start with the real wallet.

1SCiN5kqkAbxxwesKMsH9GvyWnWP5YK2W | donations
GravePhoenix (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
May 24, 2013, 06:23:59 PM
 #13

Your right the bleeding-jumbo is the most recent and already has the external mode i needed defined, now lets use it
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!