Bitcoin Forum
April 25, 2024, 01:34:22 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 [All]
  Print  
Author Topic: 0.1 BTC prize - Find Electrum pass by knowing both unecrypted+encrypted wallet?  (Read 1147 times)
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 08, 2019, 03:02:54 AM
Merited by DarkStar_ (4), LoyceV (2)
 #1

Hello guys,

I am looking for a cryptographer who can help me out with Electrum encryption. I have the following situation:

I know the wallet in Electrum unecrypted.
I also know the same wallet in Electrum but encrypted with unknown password.

So I know 2 variables already.

My question is this:

Can I determine the unknown password by knowing the Unecrypted wallet and also knowing the same wallet but Encrypted?


Known Unecrypted wallet = sha256(sha256("unknown_password")) = Known Encrypted wallet

I will offer a 0.1 prize to anyone who messages me the password from following test instance:

Unecrypted test wallet: https://pastebin.com/yemmF3Te
Encrypted test wallet: https://pastebin.com/1nLV6n1P

Message me the password to prove your skills and we will continue to the next stage which is private and on another level. I am looking at 8 figures ahead. Yes 8.

Thanks
1714052062
Hero Member
*
Offline Offline

Posts: 1714052062

View Profile Personal Message (Offline)

Ignore
1714052062
Reply with quote  #2

1714052062
Report to moderator
1714052062
Hero Member
*
Offline Offline

Posts: 1714052062

View Profile Personal Message (Offline)

Ignore
1714052062
Reply with quote  #2

1714052062
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Coding Enthusiast
Legendary
*
Offline Offline

Activity: 1039
Merit: 2783


Bitcoin and C♯ Enthusiast


View Profile WWW
July 08, 2019, 03:35:25 AM
Merited by dbshck (4), achow101 (3), ABCbits (3), LoyceV (2), bones261 (2), franckuestein (1)
 #2

That simply is impossible since AES-256 (the encryption that Electrum uses) is a modern cipher which is resistant to known-plaintext attacks and it has been designed in a way to resist this type of attack specifically since in most use cases of it we already assume that the plaintext is known.

Projects List+Suggestion box
Donate: 1Q9s or bc1q
|
|
|
FinderOuter(0.19.1)Ann-git
Denovo(0.7.0)Ann-git
Bitcoin.Net(0.26.0)Ann-git
|
|
|
BitcoinTransactionTool(0.11.0)Ann-git
WatchOnlyBitcoinWallet(3.2.1)Ann-git
SharpPusher(0.12.0)Ann-git
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 09, 2019, 01:30:34 AM
 #3

That simply is impossible since AES-256 (the encryption that Electrum uses) is a modern cipher which is resistant to known-plaintext attacks and it has been designed in a way to resist this type of attack specifically since in most use cases of it we already assume that the plaintext is known.

This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.

BOTTOM LINE

I am looking at a very large sum of money, if anyone can pass my test I will pay that 0.1 which is literally nothing, the most important aspect is that we will continue in private where I present the winner of the test to the real situation.

Let's just say I will pay easily 30 BTC or whatever the price of a Lambo Aventador is.
achow101
Moderator
Legendary
*
expert
Offline Offline

Activity: 3374
Merit: 6535


Just writing some code


View Profile WWW
July 09, 2019, 01:37:25 AM
Merited by LoyceV (2), bones261 (2), ABCbits (1), DarkStar_ (1), franckuestein (1), TechPriest (1)
 #4

This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.
That's not at all how AES works. It isn't just an equation. Sure it may sound like that would work, but AES is not some mathematical equation that you can perform such actions on.

What you are describing is called a Known Plaintext Attack. There are no known Known Plaintext Attacks on AES so what you are asking is currently impossible to do.

On paper it sounds very do-able to me
It is clear that you do not understand cryptography if this sounds doable to you. Because you don't understand cryptography, I would suggest that you don't make such assumptions as they are likely to be wrong.

marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 09, 2019, 02:55:55 AM
Merited by DarkStar_ (4), LoyceV (2)
 #5

This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.
That's not at all how AES works. It isn't just an equation. Sure it may sound like that would work, but AES is not some mathematical equation that you can perform such actions on.

What you are describing is called a Known Plaintext Attack. There are no known Known Plaintext Attacks on AES so what you are asking is currently impossible to do.

On paper it sounds very do-able to me
It is clear that you do not understand cryptography if this sounds doable to you. Because you don't understand cryptography, I would suggest that you don't make such assumptions as they are likely to be wrong.

Thanks alot! I tipped to your address.

Obviously I am a crypto noob, I never pretended that I know anything especially related to my request, it's the reason why I started this topic in the first place.

I just hoped that the way I presented it, like in an equation will make sense in cryptography too, it was a long shot but I had to try. Especially since alot of btc was involved Sad

I never knew this is called "Known-plaintext attack" I've looked into the wikipedia page and it makes alot of sense now.

I wish I could share with you my motives behind this, it was really alot of money involved.

Thanks anyway
PrimeNumber7
Copper Member
Legendary
*
Offline Offline

Activity: 1610
Merit: 1899

Amazon Prime Member #7


View Profile
July 09, 2019, 07:27:48 AM
Merited by DarkStar_ (4), LoyceV (2), ABCbits (1), bitmover (1)
 #6


For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


It would be more accurate to describe the decryption key (the password) as being on a 3-dimential plane. In your example, you can determine the solution to "X" however you do not know where on the "Z" plane the solution is, and there is an unlimited number of places on the Z axis the solution could be. Even having multiple plaintext sets will not help you.


I am going to speculate you are in a position that can be described as below:
You have an electrum wallet ("Wallet 1") that you do not have the password to
You have a second electrum wallet ("Wallet 2") that you know has the same password as Wallet 1
You have a decrypted copy of Wallet 2, possible from an old backup.
Wallet 1 has a lot of coin in it

Depending on how complex your password is, and how much you know about your password, you may be able to brute force the password via automated means. There are a number of software programs and service providers that can try to guess your password, and know if it figures it out.

For example, if you know your password is 10 digits, and is a combination of uppercase, lowercase letters and numbers that are something close to "random" there are a 8.39 * 1017 possibilities of what your password could be. However if you know your password starts with the uppercase letter "P" followed by 9 numbers that are something close to random, the number of possibilities drops to 1 * 108.
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3208



View Profile
July 09, 2019, 05:14:16 PM
 #7

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.

It may seem doable on paper according to your analogy, but your analogy massively under-represents the actual difficulty. The Wikipedia article on AES (https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) should put it in perspective.

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
seoincorporation
Legendary
*
Offline Offline

Activity: 3136
Merit: 2908


Top Crypto Casino


View Profile
July 09, 2019, 08:16:06 PM
Last edit: July 15, 2019, 05:02:26 PM by seoincorporation
 #8

Hello guys,

I am looking for a cryptographer who can help me out with Electrum encryption. I have the following situation:

I know the wallet in Electrum unecrypted.
I also know the same wallet in Electrum but encrypted with unknown password.

So I know 2 variables already.

My question is this:

Can I determine the unknown password by knowing the Unecrypted wallet and also knowing the same wallet but Encrypted?


Known Unecrypted wallet = sha256(sha256("unknown_password")) = Known Encrypted wallet

I will offer a 0.1 prize to anyone who messages me the password from following test instance:

Unecrypted test wallet: https://pastebin.com/yemmF3Te
Encrypted test wallet: https://pastebin.com/1nLV6n1P

Message me the password to prove your skills and we will continue to the next stage which is private and on another level. I am looking at 8 figures ahead. Yes 8.

Thanks

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:


Good luck for all those who try it  Wink

Update:

My answer was wrong, and i just explain what happened here: https://bitcointalk.org/index.php?topic=5162837.msg51835282#msg51835282

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3208



View Profile
July 09, 2019, 08:28:55 PM
Last edit: July 10, 2019, 04:03:21 AM by odolvlobo
 #9

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof.

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10499



View Profile
July 10, 2019, 02:43:27 AM
Merited by LoyceV (2)
 #10

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof. I'm tempted to give you neg trust for that post.

you can duplicate his screenshot by using the seed phrase OP posted in first link:
Code:
purpose horse hundred around young explain aspect off almost where lawn number

the only way he could have found the password is if the password was something simple like 123 and he simply went through the common passwords to decrypt it!

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 10, 2019, 03:07:36 AM
Merited by LoyceV (2)
 #11

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof. I'm tempted to give you neg trust for that post.

you can duplicate his screenshot by using the seed phrase OP posted in first link:
Code:
purpose horse hundred around young explain aspect off almost where lawn number

the only way he could have found the password is if the password was something simple like 123 and he simply went through the common passwords to decrypt it!

That's correct, he duplicated the wallet by entering the seed in Electrum, which was already public, nothing secret about it...

He said that the password was "bitcoin" however anyone can test that "bitcoin" will NOT decrypt the password at the encrypted test wallet: https://pastebin.com/1nLV6n1P

Some random kid wasting time here.

The password to the test encryption contains a mix of 19 chars lower case letters / Upper case letters / numbers / and a few non alphanumeric chars. No reference to any word in any dictionary. The only way to crack it is via bruteforce in tens of years, OR if anyone finds a way to retrieve the password from the 2 wallets.
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 10, 2019, 03:18:55 AM
Last edit: July 10, 2019, 03:33:37 AM by marko10921
Merited by LoyceV (2)
 #12


For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


It would be more accurate to describe the decryption key (the password) as being on a 3-dimential plane. In your example, you can determine the solution to "X" however you do not know where on the "Z" plane the solution is, and there is an unlimited number of places on the Z axis the solution could be. Even having multiple plaintext sets will not help you.


I am going to speculate you are in a position that can be described as below:
You have an electrum wallet ("Wallet 1") that you do not have the password to
You have a second electrum wallet ("Wallet 2") that you know has the same password as Wallet 1
You have a decrypted copy of Wallet 2, possible from an old backup.
Wallet 1 has a lot of coin in it

Depending on how complex your password is, and how much you know about your password, you may be able to brute force the password via automated means. There are a number of software programs and service providers that can try to guess your password, and know if it figures it out.

For example, if you know your password is 10 digits, and is a combination of uppercase, lowercase letters and numbers that are something close to "random" there are a 8.39 * 1017 possibilities of what your password could be. However if you know your password starts with the uppercase letter "P" followed by 9 numbers that are something close to random, the number of possibilities drops to 1 * 108.


You are a smart guy, and the first to understand the situation presented.

1.
I have wallet1, where seed and xprv are both encrypted with strong password, I can see the balance and it's gianormous by anyone's standards. Wallet1 cannot be cracked by nothing, dictionary and bruteforce are out of the question. Possibly bruteforce, but length of password is unknown, and I'd like to be realistic and not go that route which will lead to alot of time wasted and eventual disapointment.
2.
I have wallet 2, unecrypted and encrypted, password for encryption unknown, but 99% chance to match the one at wallet1 as it was set up by the same entity. This in my mind was the best shot I had at getting the password for wallet1 as I supposed I could reverse the equation in some way unknown to me till I started this topic. Apparently this is categorized as an attack and a serious breach if it was possible, so right now I am pretty much content with the situation unless something else comes up. I am doing pretty well in life, I am heavily invested in BTC and also an early adopter, but the amount present in wallet1 is enough motivation for anyone to try and do something about it, no matter the cost.
PrimeNumber7
Copper Member
Legendary
*
Offline Offline

Activity: 1610
Merit: 1899

Amazon Prime Member #7


View Profile
July 10, 2019, 07:16:24 AM
Merited by LoyceV (2), ABCbits (1)
 #13

The password to the test encryption contains a mix of 19 chars lower case letters / Upper case letters / numbers / and a few non alphanumeric chars. No reference to any word in any dictionary. The only way to crack it is via bruteforce in tens of years,
With modern technology, it will take a lot longer than tens of years to crack the password you describe. For all intents and purposes, the password will not be broken.



1.
I have wallet1, where seed and xprv are both encrypted with strong password, I can see the balance and it's gianormous by anyone's standards. Wallet1 cannot be cracked by nothing, dictionary and bruteforce are out of the question. Possibly bruteforce, but length of password is unknown, and I'd like to be realistic and not go that route which will lead to alot of time wasted and eventual disapointment.

In order to have any realistic chance of bruteforcing the password, it would need to be no longer than 12 characters in length, or with there being 12 unknown characters of the password if you know a portion of it.

If the wallet has ever been saved unencrypted on a device you have access to, you may be able to recover a portion of the seed or xprivkey using forensics software. If this is true, you should unplug the device immediately, and use a separate device to research how to best use computer forensics (most likely employing an expert) to look for a portion of the seed. If the unencrypted wallet was on a device a long time ago that has been used extensively in the meantime, it is unlikely you will recover any part of the seed/wallet file.

IMO, your best bet is to narrow down the password by obtaining a portion of the description of the password, such as that it starts with 'abc', ends with four numbers, or anything else you can obtain/remember, and brutforcing the password with these assumptions narrowing down the possibilities.
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 11, 2019, 04:20:04 AM
 #14

I accept the situation.

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.

Can anyone direct me to a bruteforce tool for electrum, preferably one that I can set up my own alphabet.

Or a dictionary one, where I can load a password list from text or csv.

If it's good I will tip in btc.

Thanks
Coding Enthusiast
Legendary
*
Offline Offline

Activity: 1039
Merit: 2783


Bitcoin and C♯ Enthusiast


View Profile WWW
July 11, 2019, 04:36:56 AM
 #15

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.
Can anyone direct me to a bruteforce tool for electrum, preferably one that I can set up my own alphabet.

Check out https://github.com/gurnec/btcrecover I believe it has options you are looking for.

Projects List+Suggestion box
Donate: 1Q9s or bc1q
|
|
|
FinderOuter(0.19.1)Ann-git
Denovo(0.7.0)Ann-git
Bitcoin.Net(0.26.0)Ann-git
|
|
|
BitcoinTransactionTool(0.11.0)Ann-git
WatchOnlyBitcoinWallet(3.2.1)Ann-git
SharpPusher(0.12.0)Ann-git
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 11, 2019, 06:09:46 AM
 #16

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.
Can anyone direct me to a bruteforce tool for electrum, preferably one that I can set up my own alphabet.

Check out https://github.com/gurnec/btcrecover I believe it has options you are looking for.

Thanks but it only works with Electrum 1.x and 2.x
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16550


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
July 11, 2019, 06:25:24 AM
Merited by Coding Enthusiast (1)
 #17

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.
Have you considered contacting a specialist? See Bitcoin Wallet Recovery Services - for forgotten wallet password for Dave's topic on walletrecoveryservices.com. Unless the password is too difficult, they'll have the computing power and knowledge to brute-force it.
I haven't tried (nor needed) his services, but from what I've seen, he's legit. Note that there are many "recovery services" that I wouldn't trust at all too, so be very careful which one you use!


█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Coding Enthusiast
Legendary
*
Offline Offline

Activity: 1039
Merit: 2783


Bitcoin and C♯ Enthusiast


View Profile WWW
July 11, 2019, 06:58:04 AM
 #18

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.
Can anyone direct me to a bruteforce tool for electrum, preferably one that I can set up my own alphabet.

Check out https://github.com/gurnec/btcrecover I believe it has options you are looking for.

Thanks but it only works with Electrum 1.x and 2.x

Seeds, key derivation and wallet structure changed from 1.x to 2.x but did not change in 3.x. The version 3 Electrum introduces SegWit support hence the major version bump.

Projects List+Suggestion box
Donate: 1Q9s or bc1q
|
|
|
FinderOuter(0.19.1)Ann-git
Denovo(0.7.0)Ann-git
Bitcoin.Net(0.26.0)Ann-git
|
|
|
BitcoinTransactionTool(0.11.0)Ann-git
WatchOnlyBitcoinWallet(3.2.1)Ann-git
SharpPusher(0.12.0)Ann-git
seoincorporation
Legendary
*
Offline Offline

Activity: 3136
Merit: 2908


Top Crypto Casino


View Profile
July 15, 2019, 04:44:12 PM
 #19

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof.

Sorry guys, i didn't understand the mechanic but since i could add the wallet with only the seed and 'bitcoin' password i think for a moment i found the right password, maybe a screenshot isn't proof enough, but i will post the private keys from the addies we see on the Unencrypted test wallet : https://pastebin.com/yemmF3Te

Code:
address	private_key
1NapuBZ2HwG8R97eZmUMDBbDfZMFiDwmFb KxGXVjrsFyybEMgCVQYfmBj5gDXV1dJ8hhrvgoZ635TV1maY867j
1KVPU4rBEY99tNvzEpT3Q9yNDEBHGgnb9z Kwc9gqzboTpgyQyWbt5jaB6doM8rECCTib3z7fNmF216Zs7KfDRy
18Ypd1vWSXYChQpWXV8GFbz9xfZ4WeToVS L3MSENg9LK7qzEghGjk96iko9z1FpPVpnRM1wJ1ZrstLxuQ8NnzP
1ECAsUAy96at3bnPLqazRRP5ms6we7jMu5 Kzmzo3FCSkaLPw6LiGRyS9bdpcDF63tNTd6LbdJQUyzSDTLombmn
1NJWjeP35ohkVvF75wQCN59HSc5sMngnp7 KyUhEihhTbHq8tQBHa9kZg7iaXam2eNVWZUXJUouptQNsAKwyKuJ
17bhUrTnmTRp97dADYCmXduzRJYUChfTAP KzqVnUg3tnbdZPSYXdoDwYY4gHYFpNQHTSoA7EJdMiwM3JzNmBnS
 1r8guwjoWDpbzBVdv3XWuWjj7FLT5obmD L53nipw54LBbWXZRA8d8XAEcNqm7k5zGyykaS5GynwUZmCPUkxf7
1GPkEPJWffccwBVk6fDyBEQ5U7FV7XnfgJ KxBUzqrhuDpXRRXgMShohLoj4ojVrUZ8ujDCQ6PUBhLARfmmfkMi
1A2cvszhViScACdhxb7fDKfuXQcfoHSPXW KyAFVkYZ6ZkKekWCawWJSdW6aHr9dP6rybA4LiVKywD9QAQZ3iRK
16TeBmyKmjY9AnfmGTDahRconR4R1qybh4 L4Ccwipx3WJSBZjYCa2AfCxNxKa6XZtjT6Ayd9DF9aTa7Aacyzrx
1Nh8BxDFSvW2SKmj486Eh1cffLLr1JaLQ7 L58fu5fQNj8nMgyasso8VZymdG1vqSra8NsT2atDnxzomtrVKaCv
1LwtUu2sEQ7Z53gbVqfLCH2XKvmW1wKpgH L3v5s46VqeDfKidEZo4jg93DHZSbBFWnvVwmdHriFxASaHRh3vNc
14JXuPBYhPqHuZ7qQyr5EJAXLbFG1BMywS KyqEjv6Eyhfme5Ru2f27ZdMqNuipqLDdYjYDM9vjVxW8kKXJDbLX
1GpyeXtwpTwoWYcqjfMD1WaEAqF8hqJETN KwaYNqaFAzftSey2sz7yHahrzLxumLCjkadVB3Vqpknxm4PiGp4H
 1qKdWNLaiQJ3mKCVDhW1Lq95715fJWDV4 L5kUqgyD4MqC3vHbLgz8ahR28R3ee7B2NB7w9a4sS9oKcP25RRbB
1KVzy777mWzZvVRRHt76UPVMwJ4iMDWgtC L4oaLdsck4a8vqSVEVzjcX2vBpThNWdzXEt5ZUwxNETd4a26eHZ6
1JCEL2GgfUKyu25GohKWPAdi6ctdPh2XsZ L2kEFjsPBaK9xcaDBb8N74fa3wkam6GrwWpL7meKjYcjWRPX74kJ
15PNyRBfuybB2B1D4HNWXeeV3baS7Y4bg8 L5P2WVFSmsZUZYrN1GQiCciUwe7XB4p3cXjfb4oVEM2aig5irdsh
1MURZyCqtvPH4h82qmbiu1Ah1UsBGXRNSY L3tcLKZZqCtoZXYKFHLC5ac4hbxVT3FWawWcjSG3nmRY4aoDKwrp
1Lrv1JyuXsXcQ6Q8DX8DpGvcHYHne6oWBD L2Yk6cuRgm2sdihVd4y4rZg47ydfsimBpSz3Mg8yrC9wPNxu1GbU
167dvYveHEsxCLcsCTH4T9QWHs5BsQSDYc KwUPFaExCp1YNoY7PpnyDR7fS96piKt9wMEWzXdE442EpQsu3KzY
15CxyeuMRP4yULTSxcCwu5bdjB43AToZaC KzDfS7fqhY8a3JuycwLDUivgCjursjmTmLinTbeFyKz6H4zFXNfx
17AVfBi3Y9Q1WDxJATqbU2T13ZMvKidqBK L3xU6nkYDxCpvjf43NwND52BwmmFx4JECDHoZ1ENoHT13GsVC7oD
1CBw77Uf2GtNrAi8Cv9EMGWLx1mKaCkZkC KzyeA3LCmzWvnvMc341G87hh6wZyRpUiTtiCpza94QTGTNrT9NkV
1HdksBc9ABhX3Ngw85AHBrXeXM1UTVs59g L5MvhEJATBzkokZCtMr4EX3dqzVcxruryRVweoRGotv7QQBaG6hg
1E4gmz2oybGv6ibBaiCxBdB9yVEaCSNdZY L3tQk4RbMQ6LpXJMh7aN3QN4AKfrnRqAHDPDomFkS1swrnHUUk9G

Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
odolvlobo
Legendary
*
Offline Offline

Activity: 4298
Merit: 3208



View Profile
July 15, 2019, 05:15:51 PM
 #20

...
Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

You have access to the private keys because you were given the seed.

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
seoincorporation
Legendary
*
Offline Offline

Activity: 3136
Merit: 2908


Top Crypto Casino


View Profile
July 15, 2019, 05:18:30 PM
 #21

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof.

Sorry guys, i didn't understand the mechanic but since i could add the wallet with only the seed and 'bitcoin' password i think for a moment i found the right password, maybe a screenshot isn't proof enough, but i will post the private keys from the addies we see on the Unencrypted test wallet : https://pastebin.com/yemmF3Te

Code:
lies and more lies

Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

Why do you continue lying? Those are not the private keys for those addresses. Some of them aren't even valid private keys (the first one, for example).

I don't understand why do you hate me so much, but if you want to try the keys feel free to use a service like https://brainwalletx.github.io/

Get Address From: Private Key
Point Conversion: Compressed

And then post the private key to verify them as you can see in the next image:



So, hope you can remove the negative trust, I'm not lying when I say I got access to those addys, I already apologize and as I say before, I didn't get the price because my answer was wrong, so, I don't understand why all this hate from your side. But i don't deserve a negative trust since I don't scam anyone and I'm talking with the truth.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
seoincorporation
Legendary
*
Offline Offline

Activity: 3136
Merit: 2908


Top Crypto Casino


View Profile
July 15, 2019, 05:34:34 PM
 #22

...
Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

You have access to the private keys because you were given the seed.

Since you update the post i will reply again, i don't want to spam this thread, i just want to recovery my neutral trust. i'm not a scammer odolvlobo and you are making a mistake here, i say it again, my answer was wrong and i didn't get the price, i make the mistake when i think the password was bitcoin because as you say i already have seed.

I was thinking we need the seed and the password to get access to those keys, and when i try with bitcoin password it worked, but maybe it does because was the password Electrum asked to configure the wallet. Then when i get access to those private keys i think for a moment i solve the puzzle and i posted here.

But cmon odolvlobo, it was just a try, i recognize my mistake, but i'm not a bad guy, i'm not here trying to scam, i'm the kind of guys who like to help others on the community and even sometimes i like to make giveaways to attract more people in the spanish community as you can see on the next post:

https://bitcointalk.org/index.php?topic=5104776.0
https://bitcointalk.org/index.php?topic=5083430.0
https://bitcointalk.org/index.php?topic=5126071.0
https://bitcointalk.org/index.php?topic=5117693.0

Hope you can forgive my mistake.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4316

<insert witty quote here>


View Profile
July 17, 2019, 12:18:25 AM
Merited by bones261 (2), LoyceV (1), ABCbits (1)
 #23

I was thinking we need the seed and the password to get access to those keys, and when i try with bitcoin password it worked, but maybe it does because was the password Electrum asked to configure the wallet. Then when i get access to those private keys i think for a moment i solve the puzzle and i posted here.
Electrum doesn't use the password to generate keys... it only uses the seed mnemonic. The wallet file password is only used to encrypt the data stored in the wallet file. You can setup a wallet without a password using that same seed and it will generate the same addresses/keys.

In any case, it seems you have missed the point of the OP. They were looking for a reliable method to be able to use an unencrypted Electrum wallet to determine the password of an encrypted version of that same Electrum wallet file. They were not simply asking you to "guess" or bruteforce the password for the wallet that they linked. Roll Eyes

And it would appear that odolvlobo has taken pity on you and removed their feedback.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
July 28, 2019, 01:35:30 AM
 #24

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4316

<insert witty quote here>


View Profile
July 31, 2019, 03:59:28 AM
Merited by PrimeNumber7 (1)
 #25

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.
I thought that was made fairly clear by the first reply in this thread... and then the subsequent follow up from achow Roll Eyes

Note that they are specifically talking about the AES-256 encryption used by Electrum... other encryptions may be susceptible to "known plaintext attacks".

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
keychainX
Member
**
Offline Offline

Activity: 374
Merit: 53

Telegram @keychainX


View Profile WWW
August 12, 2019, 03:08:03 PM
 #26

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.

I was just attending the Blackhat Las Vegas forum last week where we did this hands on with python scripts. You can do this both for AES-128 and AES-256. The tool I'm talking about is this: https://newae.com/tools/chipwhisperer/

I'm not going to argue wheather its possible with your specific case, but wanted to throw in my 5 cents on technologies out there which are available and theoretically could prove what you are trying to solve.

/KX

PrimeNumber7
Copper Member
Legendary
*
Offline Offline

Activity: 1610
Merit: 1899

Amazon Prime Member #7


View Profile
August 14, 2019, 06:33:08 PM
 #27

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.
What you describing might allow someone to determine the private key being used to decrypt something when an attacker has physical access to the computer.

It is not possible to look at a decrypted and encrypted version of a file and determine the decryption key.
keychainX
Member
**
Offline Offline

Activity: 374
Merit: 53

Telegram @keychainX


View Profile WWW
August 14, 2019, 09:06:55 PM
 #28

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.
What you describing might allow someone to determine the private key being used to decrypt something when an attacker has physical access to the computer.

It is not possible to look at a decrypted and encrypted version of a file and determine the decryption key.

Thats why I wrote IF you can store the decryption process in a ARM processor, which is whats "having physical access" would simulate.

/KX

Stedsm
Legendary
*
Offline Offline

Activity: 3052
Merit: 1273



View Profile
August 16, 2019, 09:17:03 AM
 #29

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

How can someone even bruteforce it when you've already claimed it to be a very heavy password with at least 19 chars having everything from alphabets to numbers to symbols and even non alphabetical characters!

Why don't you try Dave's service as directed by LoyceV? We're literally not capable of getting your password to you because if it'd be so easy to get one, it'd be called a defect as well as defeat to the properties of cryptography and show that even this genre can't be trusted in terms of keeping our data/digital money safe. We don't have quantum computing technologies with us, else that prize would have been distributed till now.

Thanks to OP for this thread actually because this thing has made one thing clear to me (I was too confused about), that when you've got your seed phrase with you but you forget your password, it means that you've lost your chance on seeing your BTC again until you remember it or just get the privkeys if ever stored anywhere out of the wallet.

██████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
██████████████████████
.SHUFFLE.COM..███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
█████████████████████
████████████████████
██████████████████████
████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
██████████████████████
██████████████████████
██████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
███████████████████████
.
...Next Generation Crypto Casino...
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4316

<insert witty quote here>


View Profile
August 19, 2019, 10:15:18 AM
 #30

Thanks to OP for this thread actually because this thing has made one thing clear to me (I was too confused about), that when you've got your seed phrase with you but you forget your password, it means that you've lost your chance on seeing your BTC again until you remember it or just get the privkeys if ever stored anywhere out of the wallet.
What? Huh Are you referring to the BIP39 passphrase? or the wallet password? Huh

If you're talking about the BIP39 passphrase, then yes... the seed mnemonic alone is not enough... you need mnemonic+passphrase to be able to recover your wallet. If you're talking about the wallet password, that is completely irrevelant, as you can simply restore your wallet from the seed mnemonic and put whatever new wallet password that you want.


█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
bartekjagoda
Jr. Member
*
Offline Offline

Activity: 87
Merit: 5


View Profile
August 19, 2019, 01:15:45 PM
 #31



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?

 Ich liebe Bitcoin
AdolfinWolf
Legendary
*
Offline Offline

Activity: 1946
Merit: 1427


View Profile
August 19, 2019, 01:36:15 PM
 #32



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?
If he could do it he would've already done it and ran with the "Large amount of money" that is supposedly stored on the wallet.

alas, he can't do it.

marko10921 (OP)
Newbie
*
Offline Offline

Activity: 11
Merit: 18


View Profile
November 20, 2019, 03:39:41 AM
Last edit: November 20, 2019, 04:36:36 AM by marko10921
 #33



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?
If he could do it he would've already done it and ran with the "Large amount of money" that is supposedly stored on the wallet.

alas, he can't do it.

Guys calm down, im waiting rockyou.txt

Edit : seed is already avaible in unencrpyted wallet, i mean no need to money transfer etc, its just password challange.

Edit2 : i tried opencl with 7 gpu bruteforce ; 1024 iteration sha512 decrypt not efficient even if opencl. Also password not in the rockyou.txt list.

I've made a random password similar to something like this: KdR.72.G@$.1eeFug.1@#s!
Just something random that you will never find in any password lists or anything, so don't even try to find it, you'll just lose your time, the whole point was to find someone capable of retrieving the password from the encrypted and decrypted file, not to bruteforce it cause it was pointless.

Again as outlined earlier by other bt members "known plaintext attacks" are not possible Sad

I have looked at the amount again and it's laughing at me back with an evil smile, and I can never access it. I guess it's the power of encryption and the universe.

I am thinking of bruteforcing it more and more, probably the length of the password is not that high, who knows, but I don't have the tools or computers required for the job, might be a dead end eventually.


LATER EDIT: THE PASSWORD TO THE PUZZLE WAS: AFS.ss4.19doEE1!wt1

One can easily verify, but since no one posted it or messaged it to me, I find this lead a dead end. I will go the bruteforce way
keychainX
Member
**
Offline Offline

Activity: 374
Merit: 53

Telegram @keychainX


View Profile WWW
November 30, 2019, 03:14:35 PM
 #34



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?
If he could do it he would've already done it and ran with the "Large amount of money" that is supposedly stored on the wallet.

alas, he can't do it.

Guys calm down, im waiting rockyou.txt

Edit : seed is already avaible in unencrpyted wallet, i mean no need to money transfer etc, its just password challange.

Edit2 : i tried opencl with 7 gpu bruteforce ; 1024 iteration sha512 decrypt not efficient even if opencl. Also password not in the rockyou.txt list.

I've made a random password similar to something like this: KdR.72.G@$.1eeFug.1@#s!
Just something random that you will never find in any password lists or anything, so don't even try to find it, you'll just lose your time, the whole point was to find someone capable of retrieving the password from the encrypted and decrypted file, not to bruteforce it cause it was pointless.

Again as outlined earlier by other bt members "known plaintext attacks" are not possible Sad

I have looked at the amount again and it's laughing at me back with an evil smile, and I can never access it. I guess it's the power of encryption and the universe.

I am thinking of bruteforcing it more and more, probably the length of the password is not that high, who knows, but I don't have the tools or computers required for the job, might be a dead end eventually.


LATER EDIT: THE PASSWORD TO THE PUZZLE WAS: AFS.ss4.19doEE1!wt1

One can easily verify, but since no one posted it or messaged it to me, I find this lead a dead end. I will go the bruteforce way

You cannot, If the password is anything close to 10+ characters you will not make it in lifetine with todays speed of computers.

/KX

Pages: 1 2 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!