vel12
|
|
October 20, 2018, 06:59:32 PM |
|
I don't have .exe file
Where can I find it?
Choose,their 3
|
|
|
|
fucilator_3000
Member
Offline
Activity: 154
Merit: 27
|
|
October 20, 2018, 07:22:17 PM |
|
I don't have .exe file
Where can I find it?
Choose,their 3 Doesn't work
|
|
|
|
vel12
|
|
October 21, 2018, 09:25:47 AM Last edit: October 21, 2018, 10:45:05 AM by vel12 |
|
I don't have .exe file
Where can I find it?
Choose,their 3 Doesn't work Read the topic, here find an example batch file(The program doesn't know what you want from it.).So far the program works only on NVIDIA cards.
|
|
|
|
stalker00075
Newbie
Offline
Activity: 54
Merit: 0
|
|
October 22, 2018, 03:06:16 PM |
|
is it possible to brute
example
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDv or BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvs or BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvsa ..... find 1KDv and save
similar to Vanitygen but there is random
and here with meaning 0000000000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000001 0000000000000000000000000000000000000000000000000000000000000002
|
|
|
|
almightyruler
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 22, 2018, 05:51:37 PM |
|
is it possible to brute
example
BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDv or BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvs or BitCrack64.exe -u -s 0000000000000000000000000000000000000000000000000000000000000000 1KDvsa ..... find 1KDv and save
Wondering what the point of this feature would be? A partial match would have hundreds of bits that don't match any address in use. The key would still be impossible to crack. If you were using it to generate your own address, by using a sequence in a small search space you would open yourself to easy cracking of the private key. You really need a vanity address (or any address!) to be generated from a 100% random key.
|
|
|
|
Remember remember the 5th of November
Legendary
Offline
Activity: 1862
Merit: 1011
Reverse engineer from time to time
|
|
October 22, 2018, 08:28:27 PM Merited by JayJuanGee (1) |
|
Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up. Even compressed Bitcoin addresses, whose pubkeys are known can be uncompressed. Another thing to add, a user on the crypto stackexchange says he managed to create a more efficient OpenCL kernel just for this https://crypto.stackexchange.com/questions/54622/optimized-modular-multiplicative-inverse-for-bitcoin-secp256k1
|
BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
|
|
|
almightyruler
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 23, 2018, 06:44:37 AM |
|
Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.
Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data.
|
|
|
|
Remember remember the 5th of November
Legendary
Offline
Activity: 1862
Merit: 1011
Reverse engineer from time to time
|
|
October 23, 2018, 04:46:04 PM Last edit: October 23, 2018, 04:56:47 PM by Remember remember the 5th of November |
|
Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.
Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data. Sorry I am not familiar with bloom filters. Bitcoin addresses are indeed a lot, but not many of them are of interest. It's pointless to add a Bitcoin address with a balance of <0.01 or <0.10 to the list. Keep the list more or less small, I mean the first 200k blocks have enough coins I guess, if they aren't spent.
|
BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
|
|
|
MoparMiningLLC
aka Stryfe
Legendary
Online
Activity: 2226
Merit: 2376
EIN: 82-3893490
|
|
October 23, 2018, 05:31:25 PM |
|
not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?
|
|
|
|
Remember remember the 5th of November
Legendary
Offline
Activity: 1862
Merit: 1011
Reverse engineer from time to time
|
|
October 23, 2018, 09:57:05 PM |
|
not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?
Not sure, I mean it's a fun pet project, but in reality it's actually infeasible. So nobody here can actually steal any bitcoins.
|
BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
|
|
|
almightyruler
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 23, 2018, 11:30:03 PM |
|
Also, it's actually wasteful checking for only one address, one should maintain a list of bitcoin addresses. Also, for a speed up, one can also use two loops, one for bitcoin addresses, whose pubkeys are unknown, and those who are known. This way you avoid doing unnecessary sha256+ripemd hashing giving some speed up.
Brainflayer uses a Bloom filter so it can check hundreds of millions of RIPEMD160 addresses simultaneously, although these days with a lot (10%+) of false positives. I don't know whether it would be possible to shoehorn a Bloom filter implementation (including the filter data) into a GPU application. The Brainflayer implementation addresses 2^32 bits (512MB of RAM), but the filter is badly saturated by the large number of Bitcoin addresses, so you would need to use a lot more RAM for the filter data. Sorry I am not familiar with bloom filters. Bitcoin addresses are indeed a lot, but not many of them are of interest. It's pointless to add a Bitcoin address with a balance of <0.01 or <0.10 to the list. Keep the list more or less small, I mean the first 200k blocks have enough coins I guess, if they aren't spent. https://en.wikipedia.org/wiki/Bloom_filterBasically it's a compressed data structure that lets you do an efficient lookup to check whether a key (in this case, a used Bitcoin address) exists in a set. The return is either: - This key is absolutely NOT in the set - This key may be in the set (possible false positive) The tradeoff is between memory usage and false positive rate. When Brainflayer was released, a Bloom filter with 2^32 bits was sufficient to keep the number of false positives low, but now that the number of addresses has increased significantly the false positive rate is too high. You do make a good point that you would only need to try to crack addresses which are funded. I'm doing brainwallet cracking for interest, not criminal intent, so I want to cover the entire address space; even obscure wallets with zero balance that were last used years ago. Random bruteforce cracking is unlikely to ever work anyway, so this discussion is largely academic.
|
|
|
|
almightyruler
Legendary
Offline
Activity: 2268
Merit: 1092
|
|
October 23, 2018, 11:46:56 PM |
|
not to sound to ignorant - but I gotta ask, is this just to crack btc addresses with the intent of stealing the btc ?
Here's a reply I posted earlier in this thread: People have probably been trying to crack keys from day 1. It's impractical to cover the entire search space - that's why crypto works - but if you have some (very) strong hints, it is possible to brute force only a small range and find some hits. As an example, there are several private keys used in the blockchain, hidden in plain sight, sitting at the very bottom of the private key range. The puzzle transactions referred to earlier in this thread also have private keys over a very limited (and known) range, so the chances of cracking them are much better.
For a key that's generated truly randomly the chances of discovering it via brute force are essentially zero. You'd probably be better off trying to mine a new Bitcoin block.
Here's a sample of some real private keys, which have had funds sent to them at some point. Since the set starts at '1' they'll be found by brute force pretty much instantly... but that's most likely the point. A randomly generated private key would be impossible to crack. 0000000000000000000000000000000000000000000000000000000000000001 0000000000000000000000000000000000000000000000000000000000000002 0000000000000000000000000000000000000000000000000000000000000003 0000000000000000000000000000000000000000000000000000000000000004 0000000000000000000000000000000000000000000000000000000000000005 0000000000000000000000000000000000000000000000000000000000000006 0000000000000000000000000000000000000000000000000000000000000007 0000000000000000000000000000000000000000000000000000000000000008 0000000000000000000000000000000000000000000000000000000000000009 000000000000000000000000000000000000000000000000000000000000000a 000000000000000000000000000000000000000000000000000000000000000b 000000000000000000000000000000000000000000000000000000000000000c 000000000000000000000000000000000000000000000000000000000000000d 000000000000000000000000000000000000000000000000000000000000000e 000000000000000000000000000000000000000000000000000000000000000f 0000000000000000000000000000000000000000000000000000000000000010 0000000000000000000000000000000000000000000000000000000000000011 0000000000000000000000000000000000000000000000000000000000000012 0000000000000000000000000000000000000000000000000000000000000013 0000000000000000000000000000000000000000000000000000000000000015 0000000000000000000000000000000000000000000000000000000000000016 0000000000000000000000000000000000000000000000000000000000000017 0000000000000000000000000000000000000000000000000000000000000018 0000000000000000000000000000000000000000000000000000000000000019 000000000000000000000000000000000000000000000000000000000000001a 000000000000000000000000000000000000000000000000000000000000001b 000000000000000000000000000000000000000000000000000000000000001c 000000000000000000000000000000000000000000000000000000000000001e 000000000000000000000000000000000000000000000000000000000000001f
I know this looks like simple sequential counting, but if you look carefully you'll see one number missing. All of these private keys are valid.
|
|
|
|
MoparMiningLLC
aka Stryfe
Legendary
Online
Activity: 2226
Merit: 2376
EIN: 82-3893490
|
|
October 24, 2018, 10:46:11 AM |
|
well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.
|
|
|
|
bob123
Legendary
Offline
Activity: 1624
Merit: 2481
|
|
October 24, 2018, 11:59:46 AM |
|
well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.
This tool is to bruteforce private keys. Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers). The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool. This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..).
|
|
|
|
MoparMiningLLC
aka Stryfe
Legendary
Online
Activity: 2226
Merit: 2376
EIN: 82-3893490
|
|
October 24, 2018, 12:17:25 PM |
|
well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.
This tool is to bruteforce private keys. Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers). The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool. This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..). Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances.
|
|
|
|
Remember remember the 5th of November
Legendary
Offline
Activity: 1862
Merit: 1011
Reverse engineer from time to time
|
|
October 24, 2018, 03:36:09 PM |
|
well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.
This tool is to bruteforce private keys. Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers). The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool. This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..). Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances. Which is even worse!!! Do you know what the likelyhood is of getting 1 right out of 256 bit(well, slightly less than that) keys is?
|
BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
|
|
|
MoparMiningLLC
aka Stryfe
Legendary
Online
Activity: 2226
Merit: 2376
EIN: 82-3893490
|
|
October 24, 2018, 03:38:26 PM |
|
well apparently it is against some moderators rule to question this apparent attempt to hack private keys - so carry on! seriously hope this never succeeds.
This tool is to bruteforce private keys. Bruteforcing means to try out every possible combination. You can't forbid someone to try out each number (since private keys are basically just big numbers). The keyspace is big enough for a randomly generated private key to be never found by such a bruteforce tool. This is not hacking in any way. It is just 'trying out numbers' (and it will not succeed in finding private keys generated by proper wallets/clients/etc..). Oh, I get that it wont succeed, however, several of the posts here are specifically about targeting specific wallets with high enough balances. Which is even worse!!! Do you know what the likelyhood is of getting 1 right out of 256 bit(well, slightly less than that) keys is? next to zero - still disturbing that seems to be the goal here for some - I get for others it is just the puzzle part of it. but when I see people asking how to target specific high value keys...
|
|
|
|
TrumenPack
Newbie
Offline
Activity: 30
Merit: 0
|
|
November 05, 2018, 03:31:09 PM |
|
Greetings to all !!! I had a problem with the launch ((when I ran the first time through the BitCrack.exe console I got an error: --------------------------- BitCrack.exe - System Error --------------------------- The code could not be continued because the system did not detect the cudart32_80.dll. To resolve this issue, try reinstalling the program. --------------------------- OK --------------------------- As I understand it, the error was related to the video card. I updated my nvideo I have Windows 10 / 32bit / I use NVIDEO GeForce GT 650M The error did not disappear !!Something very much confused! How to fix it? Be kindly help please with the launch!
|
|
|
|
bob123
Legendary
Offline
Activity: 1624
Merit: 2481
|
|
November 05, 2018, 03:53:26 PM |
|
Greetings to all !!! I had a problem with the launch ((when I ran the first time through the BitCrack.exe console I got an error: --------------------------- BitCrack.exe - System Error --------------------------- The code could not be continued because the system did not detect the cudart32_80.dll. To resolve this issue, try reinstalling the program. --------------------------- OK --------------------------- As I understand it, the error was related to the video card. I updated my nvideo I have Windows 10 / 32bit / I use NVIDEO GeForce GT 650M The error did not disappear !!Something very much confused! How to fix it? Be kindly help please with the launch! cudart32_80.dll is part of the CUDA toolkit. Do you have it installed? If not, get it from nvidia.com ( https://developer.nvidia.com/cuda-downloads?target_os=Windows)
|
|
|
|
|
|