Bitcoin Forum
April 18, 2024, 09:26:33 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: 1 BTC bounty for password recovery  (Read 256 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
propoker231 (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
October 03, 2020, 05:23:08 PM
Last edit: October 03, 2020, 05:44:59 PM by propoker231
 #1

Hi, I need to recover password for my BTC wallet.dat.

I offer 1 BTC for password recovery and also I pay everyone who try do it after providing evidence.

Hash from bitcoin2john.py: $bitcoin$64$a95f920ca1fe7dc5ec9c1ac72cf80da3d6621abc4093e86e6ceebc1f5bad4c63$16$4b1887786d6d3451$67195$2$00$2$00

Password was randomly generated, saved in txt file for copy paste use - file with password is lost and I couldn't restore it.

Everyone who would like to participate, leave pattern which you use to let others know which pattern to skip.

Let me know what else info should I add.

Thank you.
1713432393
Hero Member
*
Offline Offline

Posts: 1713432393

View Profile Personal Message (Offline)

Ignore
1713432393
Reply with quote  #2

1713432393
Report to moderator
"This isn't the kind of software where we can leave so many unresolved bugs that we need a tracker for them." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713432393
Hero Member
*
Offline Offline

Posts: 1713432393

View Profile Personal Message (Offline)

Ignore
1713432393
Reply with quote  #2

1713432393
Report to moderator
persocra
Newbie
*
Offline Offline

Activity: 13
Merit: 0


View Profile
October 03, 2020, 05:35:24 PM
 #2

Any hints on the password, or pattern used? Also, can you supply evidence this is your wallet?
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10489



View Profile
October 04, 2020, 05:24:45 AM
Merited by ABCbits (1), icopress (1)
 #3

Let me know what else info should I add.
in order to brute force anything you'll need to reduce the search space as much as possible which means knowing as much information as possible about the password for this case. for example these information would help a lot:
- length of the password (eg. 6 character, 8, 12, 20?)
- type of characters used (upper case, lower case, mix of both, symbols, which symbols if any, numbers)
- any character that you can remember would also reduce it by a lot.

not knowing these things simply means it is impossible to recover this password specially since you said it was created randomly which i'm assuming means using a password generator.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Timelord2067
Legendary
*
Offline Offline

Activity: 3654
Merit: 2216


💲🏎️💨🚓


View Profile
October 04, 2020, 05:26:30 AM
 #4

Which Escrow are you going to lodge the reward with, and, what duration will they hold the funds on your behalf while users are researching your password?

HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4316

<insert witty quote here>


View Profile
October 04, 2020, 10:49:01 PM
Merited by malevolent (1)
 #5

Let me know what else info should I add.
Unfortunately, this question needs to be asked... "Is it actually your wallet.dat? or is this a wallet.dat that you bought that is supposed to have XYZ BTC in it?" Huh

Please be honest, so that users don't waste time/money/resources on a fools errand, attempting to bruteforce the password to a "fake" wallet.dat. If it is actually your wallet.dat, then please provide the information requested by pooya87, as he stated, without more info, this is basically an "impossible" task. Undecided

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Btcspot
Jr. Member
*
Offline Offline

Activity: 184
Merit: 1


View Profile
October 05, 2020, 12:06:54 AM
Last edit: October 05, 2020, 12:21:09 AM by Btcspot
 #6

 Hi if still have the computer with the text file that had the password then you can scan hard drive with this software.
You can download it here= https://www.wondershare.net/ad/all-data-recovery/data-recovery-new.html
Hopefully you can get your password.
BASE16
Member
**
Offline Offline

Activity: 180
Merit: 38


View Profile
October 05, 2020, 06:58:43 AM
 #7

There are a lot of people on this board who are using the word impossible on a consistent basis.
It is safe to just ignore their writings because they are either easily proven wrong, or in my case they have already been proven wrong many times because i already did what they are claiming to be impossible many times in the past.
And i am sure that i am not the only one.
Why these people keep using the word impossible over and over again is beyond my understanding, perhaps they blindly assume and accept the calculations without ever trying themselves or they just copy paste what other members are claiming or they do not realize that there are people that are doing these impossible things while they are publishing their claims that it can not be done.

The problem i have with this topic and all the other topics that shine with a 'Bounty'  or 'Reward' at the top is that these bounty's never seem to get paid.
The topic either just dies out or the person who opened it just vanishes.
I can thus only join Timelord2067's point of view and have the funds proven to be available and locked into an escrow account.
 
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10489



View Profile
October 05, 2020, 10:57:40 AM
 #8

There are a lot of people on this board who are using the word impossible on a consistent basis.
you should learn to read the entire comments not just one word from it. there is a "condition" before "impossible".

Quote
in my case they have already been proven wrong many times because i already did what they are claiming to be impossible many times in the past.
i would love to see the case where one breaks an encryption that used a randomly generated password without even knowing how long the password was.
please post links!

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
BASE16
Member
**
Offline Offline

Activity: 180
Merit: 38


View Profile
October 10, 2020, 04:51:12 PM
 #9

Of course it's easy to understand that in most cases it will not be possible due to the amount of the truncated data in the hash cycle, for example 100 Megabyte in and 32 Bytes out in this case it would certainly be impossible to rediscover the 100 Megabytes from the given 32 Byte hash output.

you should learn to read the entire comments not just one word from it. there is a "condition" before "impossible".

Of course i did read the post otherwise i would not be posting here so here is the part i was referring to:


- length of the password (eg. 6 character, 8, 12, 20?)
- type of characters used (upper case, lower case, mix of both, symbols, which symbols if any, numbers)
 
not knowing these things simply means it is impossible

So here we are talking about a simple password and not a 100 Megabyte file.
A password can many times be shorter then 32 Bytes and in such case the amount of truncated data would be far less then in the 100 Megabyte case.
I have successfully rediscovered many passwords without knowing any of the above parameters.
The most important factors in such case are as always hash rate and the time spent searching.
I did not do this at home and i rented the hardware from a server company.
I just want to say that given enough time and hash power, it's not impossible, in stead it is inevitable that you will rediscover the password.
There is a very big difference between impossible and inevitable.
Impossible is never going to happen while inevitable is guaranteed to happen.


i would love to see the case where one breaks an encryption that used a randomly generated password without even knowing how long the password was.
please post links!

Why do so many people think that there is a url for everything.
I do not keep a blog of my activities.
And i don't want to because the process is simple anyone can set it up and try for themselves.
There are many tools available that can help but i always recommend writing your own from scratch.

In any case OP seems to have vanished (as expected)
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!