Bitcoin Forum
April 26, 2024, 09:45:00 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 96 »
  Print  
Author Topic: BitCrack - A tool for brute-forcing private keys  (Read 74396 times)
vel12
Full Member
***
Offline Offline

Activity: 475
Merit: 101



View Profile
October 20, 2018, 06:59:32 PM
 #41

I don't have .exe file

Where can I find it?
Choose,their 3
1714124700
Hero Member
*
Offline Offline

Posts: 1714124700

View Profile Personal Message (Offline)

Ignore
1714124700
Reply with quote  #2

1714124700
Report to moderator
1714124700
Hero Member
*
Offline Offline

Posts: 1714124700

View Profile Personal Message (Offline)

Ignore
1714124700
Reply with quote  #2

1714124700
Report to moderator
It is a common myth that Bitcoin is ruled by a majority of miners. This is not true. Bitcoin miners "vote" on the ordering of transactions, but that's all they do. They can't vote to change the network rules.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
fucilator_3000
Member
**
Offline Offline

Activity: 154
Merit: 27


View Profile
October 20, 2018, 07:22:17 PM
 #42

I don't have .exe file

Where can I find it?
Choose,their 3



Doesn't work Sad
vel12
Full Member
***
Offline Offline

Activity: 475
Merit: 101



View Profile
October 21, 2018, 09:25:47 AM
Last edit: October 21, 2018, 10:45:05 AM by vel12
 #43

Read the topic, here find an example batch file(The program doesn't know what you want from it.).So far the program works only on NVIDIA cards.
stalker00075
Newbie
*
Offline Offline

Activity: 54
Merit: 0


View Profile
October 22, 2018, 03:06:16 PM
 #44

is it possible to brute

example

BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDv
or
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvs
or
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvsa
.....
find
1KDv and save


similar to Vanitygen but there is random

and here with meaning
0000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000000000000000001
0000000000000000000000000000000000000000000000000000000000000002
almightyruler
Legendary
*
Offline Offline

Activity: 2268
Merit: 1092


View Profile
October 22, 2018, 05:51:37 PM
 #45

is it possible to brute

example

BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDv
or
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvs
or
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvsa
.....
find
1KDv and save

Wondering what the point of this feature would be? A partial match would have hundreds of bits that don't match any address in use. The key would still be impossible to crack.

If you were using it to generate your own address, by using a sequence in a small search space you would open yourself to easy cracking of the private key. You really need a vanity address (or any address!) to be generated from a 100% random key.
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
October 22, 2018, 08:28:27 PM
Merited by JayJuanGee (1)
 #46

Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.

Even compressed Bitcoin addresses, whose pubkeys are known can be uncompressed. Another thing to add, a user on the crypto stackexchange says he managed to create a more efficient OpenCL kernel just for this https://crypto.stackexchange.com/questions/54622/optimized-modular-multiplicative-inverse-for-bitcoin-secp256k1

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
almightyruler
Legendary
*
Offline Offline

Activity: 2268
Merit: 1092


View Profile
October 23, 2018, 06:44:37 AM
 #47

Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.

Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data.
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
October 23, 2018, 04:46:04 PM
Last edit: October 23, 2018, 04:56:47 PM by Remember remember the 5th of November
 #48

Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.

Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data.
Sorry I am not familiar with bloom filters.

Bitcoin addresses are indeed a lot, but not many of them are of interest. It's pointless to add a Bitcoin address with a balance of <0.01 or <0.10 to the list. Keep the list more or less small, I mean the first 200k blocks have enough coins I guess, if they aren't spent.

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
MoparMiningLLC
aka Stryfe
Legendary
*
Online Online

Activity: 2058
Merit: 2201


EIN: 82-3893490


View Profile WWW
October 23, 2018, 05:31:25 PM
 #49

not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?

Mine BTC @ kano.is
Offering escrow services https://bitcointalk.org/index.php?topic=5154480
All Bitcoin 3D printing needs at CryptoCloaks
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
October 23, 2018, 09:57:05 PM
 #50

not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?
Not sure, I mean it's a fun pet project, but in reality it's actually infeasible. So nobody here can actually steal any bitcoins.

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
almightyruler
Legendary
*
Offline Offline

Activity: 2268
Merit: 1092


View Profile
October 23, 2018, 11:30:03 PM
Merited by th3nolo (1)
 #51

Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.

Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data.
Sorry I am not familiar with bloom filters.

Bitcoin addresses are indeed a lot, but not many of them are of interest. It's pointless to add a Bitcoin address with a balance of <0.01 or <0.10 to the list. Keep the list more or less small, I mean the first 200k blocks have enough coins I guess, if they aren't spent.

https://en.wikipedia.org/wiki/Bloom_filter

Basically it's a compressed data structure that lets you do an efficient lookup to check whether a key (in this case, a used Bitcoin address) exists in a set. The return is either:

- This key is absolutely NOT in the set
- This key may be in the set (possible false positive)

The tradeoff is between memory usage and false positive rate. When Brainflayer was released, a Bloom filter with 2^32 bits was sufficient to keep the number of false positives low, but now that the number of addresses has increased significantly the false positive rate is too high.

You do make a good point that you would only need to try to crack addresses which are funded. I'm doing brainwallet cracking for interest, not criminal intent, so I want to cover the entire address space; even obscure wallets with zero balance that were last used years ago.

Random bruteforce cracking is unlikely to ever work anyway, so this discussion is largely academic. Smiley
almightyruler
Legendary
*
Offline Offline

Activity: 2268
Merit: 1092


View Profile
October 23, 2018, 11:46:56 PM
 #52

not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?

Here's a reply I posted earlier in this thread:

People have probably been trying to crack keys from day 1. It's impractical to cover the entire search space - that's why crypto works - but if you have some (very) strong hints, it is possible to brute force only a small range and find some hits. As an example, there are several private keys used in the blockchain, hidden in plain sight, sitting at the very bottom of the private key range. The puzzle transactions referred to earlier in this thread also have private keys over a very limited (and known) range, so the chances of cracking them are much better.

For a key that's generated truly randomly the chances of discovering it via brute force are essentially zero. You'd probably be better off trying to mine a new Bitcoin block.

Here's a sample of some real private keys, which have had funds sent to them at some point. Since the set starts at '1' they'll be found by brute force pretty much instantly... but that's most likely the point. A randomly generated private key would be impossible to crack.

0000000000000000000000000000000000000000000000000000000000000001
0000000000000000000000000000000000000000000000000000000000000002
0000000000000000000000000000000000000000000000000000000000000003
0000000000000000000000000000000000000000000000000000000000000004
0000000000000000000000000000000000000000000000000000000000000005
0000000000000000000000000000000000000000000000000000000000000006
0000000000000000000000000000000000000000000000000000000000000007
0000000000000000000000000000000000000000000000000000000000000008
0000000000000000000000000000000000000000000000000000000000000009
000000000000000000000000000000000000000000000000000000000000000a
000000000000000000000000000000000000000000000000000000000000000b
000000000000000000000000000000000000000000000000000000000000000c
000000000000000000000000000000000000000000000000000000000000000d
000000000000000000000000000000000000000000000000000000000000000e
000000000000000000000000000000000000000000000000000000000000000f
0000000000000000000000000000000000000000000000000000000000000010
0000000000000000000000000000000000000000000000000000000000000011
0000000000000000000000000000000000000000000000000000000000000012
0000000000000000000000000000000000000000000000000000000000000013
0000000000000000000000000000000000000000000000000000000000000015
0000000000000000000000000000000000000000000000000000000000000016
0000000000000000000000000000000000000000000000000000000000000017
0000000000000000000000000000000000000000000000000000000000000018
0000000000000000000000000000000000000000000000000000000000000019
000000000000000000000000000000000000000000000000000000000000001a
000000000000000000000000000000000000000000000000000000000000001b
000000000000000000000000000000000000000000000000000000000000001c
000000000000000000000000000000000000000000000000000000000000001e
000000000000000000000000000000000000000000000000000000000000001f


I know this looks like simple sequential counting, but if you look carefully you'll see one number missing. All of these private keys are valid.
MoparMiningLLC
aka Stryfe
Legendary
*
Online Online

Activity: 2058
Merit: 2201


EIN: 82-3893490


View Profile WWW
October 24, 2018, 10:46:11 AM
 #53

well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.

Mine BTC @ kano.is
Offering escrow services https://bitcointalk.org/index.php?topic=5154480
All Bitcoin 3D printing needs at CryptoCloaks
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
October 24, 2018, 11:59:46 AM
 #54

well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.


This tool is to bruteforce private keys.
Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers).

The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool.

This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..).

MoparMiningLLC
aka Stryfe
Legendary
*
Online Online

Activity: 2058
Merit: 2201


EIN: 82-3893490


View Profile WWW
October 24, 2018, 12:17:25 PM
 #55

well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.


This tool is to bruteforce private keys.
Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers).

The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool.

This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..).

Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances.

Mine BTC @ kano.is
Offering escrow services https://bitcointalk.org/index.php?topic=5154480
All Bitcoin 3D printing needs at CryptoCloaks
Remember remember the 5th of November
Legendary
*
Offline Offline

Activity: 1862
Merit: 1011

Reverse engineer from time to time


View Profile
October 24, 2018, 03:36:09 PM
 #56

well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.


This tool is to bruteforce private keys.
Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers).

The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool.

This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..).

Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances.
Which is even worse!!! Do you know what the likelyhood is of getting 1 right out of 256 bit(well, slightly less than that) keys is?

BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
MoparMiningLLC
aka Stryfe
Legendary
*
Online Online

Activity: 2058
Merit: 2201


EIN: 82-3893490


View Profile WWW
October 24, 2018, 03:38:26 PM
 #57

well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.


This tool is to bruteforce private keys.
Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers).

The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool.

This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..).

Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances.
Which is even worse!!! Do you know what the likelyhood is of getting 1 right out of 256 bit(well, slightly less than that) keys is?

next to zero - still disturbing that seems to be the goal here  for some - I get for others it is just the puzzle part of it. but when I see people asking how to target specific high value keys...

Mine BTC @ kano.is
Offering escrow services https://bitcointalk.org/index.php?topic=5154480
All Bitcoin 3D printing needs at CryptoCloaks
TrumenPack
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
November 05, 2018, 03:31:09 PM
 #58

Greetings to all !!! I had a problem with the launch ((when I ran the first time through the BitCrack.exe console I got an error:

Code:
---------------------------
BitCrack.exe - System Error
---------------------------
The code could not be continued because the system did not detect the cudart32_80.dll. To resolve this issue, try reinstalling the program.
---------------------------
OK
---------------------------


As I understand it, the error was related to the video card. I updated my nvideo

 
I have Windows 10 / 32bit / I use NVIDEO GeForce GT 650M

The error did not disappear !!

Something very much confused! How to fix it?
Be kindly help please with the launch!
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
November 05, 2018, 03:53:26 PM
 #59

Greetings to all !!! I had a problem with the launch ((when I ran the first time through the BitCrack.exe console I got an error:

Code:
---------------------------
BitCrack.exe - System Error
---------------------------
The code could not be continued because the system did not detect the cudart32_80.dll. To resolve this issue, try reinstalling the program.
---------------------------
OK
---------------------------


As I understand it, the error was related to the video card. I updated my nvideo

 
I have Windows 10 / 32bit / I use NVIDEO GeForce GT 650M

The error did not disappear !!

Something very much confused! How to fix it?
Be kindly help please with the launch!


cudart32_80.dll is part of the CUDA toolkit. Do you have it installed?

If not, get it from nvidia.com (https://developer.nvidia.com/cuda-downloads?target_os=Windows)

TrumenPack
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
November 06, 2018, 06:57:35 PM
 #60

Greetings to All! If there are people who can help me? My task is to use the “BitCrack” program to find one private key from 10,000,000 Bitcoin Addresses. This is my scientific work. I created a theme and described:
https://bitcointalk.org/index.php?topic=5060735.msg47651430#msg47651430
Pages: « 1 2 [3] 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 ... 96 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!