Bitcoin Forum
November 19, 2019, 02:22:03 AM *
News: Latest Bitcoin Core release: 0.18.1 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: 0.1 BTC prize - Find Electrum pass by knowing both unecrypted+encrypted wallet?  (Read 868 times)
seoincorporation
Legendary
*
Offline Offline

Activity: 1526
Merit: 1519


BtcBoss


View Profile
July 15, 2019, 05:18:30 PM
 #21

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof.

Sorry guys, i didn't understand the mechanic but since i could add the wallet with only the seed and 'bitcoin' password i think for a moment i found the right password, maybe a screenshot isn't proof enough, but i will post the private keys from the addies we see on the Unencrypted test wallet : https://pastebin.com/yemmF3Te

Code:
lies and more lies

Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

Why do you continue lying? Those are not the private keys for those addresses. Some of them aren't even valid private keys (the first one, for example).

I don't understand why do you hate me so much, but if you want to try the keys feel free to use a service like https://brainwalletx.github.io/

Get Address From: Private Key
Point Conversion: Compressed

And then post the private key to verify them as you can see in the next image:



So, hope you can remove the negative trust, I'm not lying when I say I got access to those addys, I already apologize and as I say before, I didn't get the price because my answer was wrong, so, I don't understand why all this hate from your side. But i don't deserve a negative trust since I don't scam anyone and I'm talking with the truth.

.BitDice.               ▄▄███▄▄
           ▄▄██▀▀ ▄ ▀▀██▄▄
      ▄▄█ ▀▀  ▄▄█████▄▄  ▀▀ █▄▄
  ▄▄██▀▀     ▀▀ █████ ▀▀     ▀▀██▄▄
██▀▀ ▄▄██▀      ▀███▀      ▀██▄▄ ▀▀██
██  ████▄▄       ███       ▄▄████  ██
██  █▀▀████▄▄  ▄█████▄  ▄▄████▀▀█  ██
██  ▀     ▀▀▀███████████▀▀▀     ▀  ██
             ███████████
██  ▄     ▄▄▄███████████▄▄▄     ▄  ██
██  █▄▄████▀▀  ▀█████▀  ▀▀████▄▄█  ██
██  ████▀▀       ███       ▀▀████  ██
██▄▄ ▀▀██▄      ▄███▄      ▄██▀▀ ▄▄██
  ▀▀██▄▄     ▄▄ █████ ▄▄     ▄▄██▀▀
      ▀▀█ ▄▄  ▀▀█████▀▀  ▄▄ █▀▀
           ▀▀██▄▄ ▀ ▄▄██▀▀
               ▀▀███▀▀
        ▄▄███████▄▄
     ▄███████████████▄
    ████▀▀       ▀▀████
   ████▀           ▀████
   ████             ████
   ████ ▄▄▄▄▄▄▄▄▄▄▄ ████
▄█████████████████████████▄
██████████▀▀▀▀▀▀▀██████████
████                   ████
████                   ████
████                   ████
████                   ████
████                   ████
████▄                 ▄████
████████▄▄▄     ▄▄▄████████
  ▀▀▀█████████████████▀▀▀
        ▀▀▀█████▀▀▀
▄▄████████████████████████████████▄▄
██████████████████████████████████████
█████                            █████
█████                            █████
█████                            █████
█████                            █████
█████                     ▄▄▄▄▄▄▄▄▄▄
█████                   ▄█▀▀▀▀▀▀▀▀▀▀█▄
█████                   ██          ██
█████                   ██          ██
█████                   ██          ██
██████████████████▀▀███ ██          ██
 ████████████████▄  ▄██ ██          ██
   ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ██          ██
             ██████████ ██          ██
           ▄███████████ ██████▀▀██████
          █████████████  ▀████▄▄████▀
[/]
1574130123
Hero Member
*
Offline Offline

Posts: 1574130123

View Profile Personal Message (Offline)

Ignore
1574130123
Reply with quote  #2

1574130123
Report to moderator
1574130123
Hero Member
*
Offline Offline

Posts: 1574130123

View Profile Personal Message (Offline)

Ignore
1574130123
Reply with quote  #2

1574130123
Report to moderator
1574130123
Hero Member
*
Offline Offline

Posts: 1574130123

View Profile Personal Message (Offline)

Ignore
1574130123
Reply with quote  #2

1574130123
Report to moderator
The Bitcoin Forum is turning 10 years old! Join the community in sharing and exploring the notable posts made over the years.
seoincorporation
Legendary
*
Offline Offline

Activity: 1526
Merit: 1519


BtcBoss


View Profile
July 15, 2019, 05:34:34 PM
 #22

...
Since i got access to those private keys i assume i got access to the wallet, maybe the method i used was wrong or i get confused, sorry to waste your time guys.

You have access to the private keys because you were given the seed.

Since you update the post i will reply again, i don't want to spam this thread, i just want to recovery my neutral trust. i'm not a scammer odolvlobo and you are making a mistake here, i say it again, my answer was wrong and i didn't get the price, i make the mistake when i think the password was bitcoin because as you say i already have seed.

I was thinking we need the seed and the password to get access to those keys, and when i try with bitcoin password it worked, but maybe it does because was the password Electrum asked to configure the wallet. Then when i get access to those private keys i think for a moment i solve the puzzle and i posted here.

But cmon odolvlobo, it was just a try, i recognize my mistake, but i'm not a bad guy, i'm not here trying to scam, i'm the kind of guys who like to help others on the community and even sometimes i like to make giveaways to attract more people in the spanish community as you can see on the next post:

https://bitcointalk.org/index.php?topic=5104776.0
https://bitcointalk.org/index.php?topic=5083430.0
https://bitcointalk.org/index.php?topic=5126071.0
https://bitcointalk.org/index.php?topic=5117693.0

Hope you can forgive my mistake.

.BitDice.               ▄▄███▄▄
           ▄▄██▀▀ ▄ ▀▀██▄▄
      ▄▄█ ▀▀  ▄▄█████▄▄  ▀▀ █▄▄
  ▄▄██▀▀     ▀▀ █████ ▀▀     ▀▀██▄▄
██▀▀ ▄▄██▀      ▀███▀      ▀██▄▄ ▀▀██
██  ████▄▄       ███       ▄▄████  ██
██  █▀▀████▄▄  ▄█████▄  ▄▄████▀▀█  ██
██  ▀     ▀▀▀███████████▀▀▀     ▀  ██
             ███████████
██  ▄     ▄▄▄███████████▄▄▄     ▄  ██
██  █▄▄████▀▀  ▀█████▀  ▀▀████▄▄█  ██
██  ████▀▀       ███       ▀▀████  ██
██▄▄ ▀▀██▄      ▄███▄      ▄██▀▀ ▄▄██
  ▀▀██▄▄     ▄▄ █████ ▄▄     ▄▄██▀▀
      ▀▀█ ▄▄  ▀▀█████▀▀  ▄▄ █▀▀
           ▀▀██▄▄ ▀ ▄▄██▀▀
               ▀▀███▀▀
        ▄▄███████▄▄
     ▄███████████████▄
    ████▀▀       ▀▀████
   ████▀           ▀████
   ████             ████
   ████ ▄▄▄▄▄▄▄▄▄▄▄ ████
▄█████████████████████████▄
██████████▀▀▀▀▀▀▀██████████
████                   ████
████                   ████
████                   ████
████                   ████
████                   ████
████▄                 ▄████
████████▄▄▄     ▄▄▄████████
  ▀▀▀█████████████████▀▀▀
        ▀▀▀█████▀▀▀
▄▄████████████████████████████████▄▄
██████████████████████████████████████
█████                            █████
█████                            █████
█████                            █████
█████                            █████
█████                     ▄▄▄▄▄▄▄▄▄▄
█████                   ▄█▀▀▀▀▀▀▀▀▀▀█▄
█████                   ██          ██
█████                   ██          ██
█████                   ██          ██
██████████████████▀▀███ ██          ██
 ████████████████▄  ▄██ ██          ██
   ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ██          ██
             ██████████ ██          ██
           ▄███████████ ██████▀▀██████
          █████████████  ▀████▄▄████▀
[/]
HCP
Legendary
*
Offline Offline

Activity: 1148
Merit: 1860

<insert witty quote here>


View Profile
July 17, 2019, 12:18:25 AM
Merited by bones261 (2), ETFbitcoin (1), LoyceV (1)
 #23

I was thinking we need the seed and the password to get access to those keys, and when i try with bitcoin password it worked, but maybe it does because was the password Electrum asked to configure the wallet. Then when i get access to those private keys i think for a moment i solve the puzzle and i posted here.
Electrum doesn't use the password to generate keys... it only uses the seed mnemonic. The wallet file password is only used to encrypt the data stored in the wallet file. You can setup a wallet without a password using that same seed and it will generate the same addresses/keys.

In any case, it seems you have missed the point of the OP. They were looking for a reliable method to be able to use an unencrypted Electrum wallet to determine the password of an encrypted version of that same Electrum wallet file. They were not simply asking you to "guess" or bruteforce the password for the wallet that they linked. Roll Eyes

And it would appear that odolvlobo has taken pity on you and removed their feedback.

marko10921
Newbie
*
Offline Offline

Activity: 9
Merit: 16


View Profile
July 28, 2019, 01:35:30 AM
 #24

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.
HCP
Legendary
*
Offline Offline

Activity: 1148
Merit: 1860

<insert witty quote here>


View Profile
July 31, 2019, 03:59:28 AM
Merited by PrimeNumber7 (1)
 #25

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.
I thought that was made fairly clear by the first reply in this thread... and then the subsequent follow up from achow Roll Eyes

Note that they are specifically talking about the AES-256 encryption used by Electrum... other encryptions may be susceptible to "known plaintext attacks".

keychainX
Member
**
Offline Offline

Activity: 269
Merit: 25

Telegram @keychainxIO


View Profile WWW
August 12, 2019, 03:08:03 PM
 #26

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.

I was just attending the Blackhat Las Vegas forum last week where we did this hands on with python scripts. You can do this both for AES-128 and AES-256. The tool I'm talking about is this: https://newae.com/tools/chipwhisperer/

I'm not going to argue wheather its possible with your specific case, but wanted to throw in my 5 cents on technologies out there which are available and theoretically could prove what you are trying to solve.

/KX

PrimeNumber7
Sr. Member
****
Offline Offline

Activity: 266
Merit: 339



View Profile
August 14, 2019, 06:33:08 PM
 #27

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.
What you describing might allow someone to determine the private key being used to decrypt something when an attacker has physical access to the computer.

It is not possible to look at a decrypted and encrypted version of a file and determine the decryption key.

smartmixer.io▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
Make your Cryptos untraceable!
(( ███████ ((    TELEGRAM    )) ███████ ))
▄▄███████▄▄
▄███████▀███████▄
▄███▀▀▀ ▄▄▄ ▀▀▀███▄
▄███ ▄▀▀▀   ▀▀▀▄ ███▄
████ █  ▄   ▄█ █ ████
████▌▐▌ ▀█▄█▀ ▐▌▐████
▀████ ▀▄  ▀  ▄▀ ████▀
▀████▄ ▀▄▄▄▀ ▄████▀
▀█████▄▄ ▄▄█████▀
▀▀███████▀▀
.

NO LOGS
▄▄███████▄▄
▄██████▀▀▀██████▄
▄█████▀ ▄▄▄ ▀█████▄
▄██████ ▀   █ ██████▄
███████   █▀  ███████
████████▄ ▄ ▄████████
▀████▀         ▀████▀
▀███   ▄   ▄   ███▀
▀███████████████▀
▀▀███████▀▀
.

NO SIGN-UP
▄▄███████▄▄
▄███████████████▄
▄███████▀   ▀█████▄
▄████▀  ▀      █████▄
████     ▄▀▄  ▀ ▀████
███    ▄▀▄ ▄▀▄    ███
▀███▄▄  ▀█ █▀   ▄███▀
▀████████ ████████▀
▀███████████████▀
▀▀███████▀▀
.

70% COMSN
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
MIX NOW!
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
▄  ▄  ▄  ▄  ▄

▀  ▀  ▀  ▀  ▀
keychainX
Member
**
Offline Offline

Activity: 269
Merit: 25

Telegram @keychainxIO


View Profile WWW
August 14, 2019, 09:06:55 PM
 #28

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

Well, theoretically its possible if you could store the decryption process in an ARM processor. There are ways to decrypt the AES key with tools such as the chipwhisperer, using methods like power consumption detection.
What you describing might allow someone to determine the private key being used to decrypt something when an attacker has physical access to the computer.

It is not possible to look at a decrypted and encrypted version of a file and determine the decryption key.

Thats why I wrote IF you can store the decryption process in a ARM processor, which is whats "having physical access" would simulate.

/KX

Stedsm
Legendary
*
Online Online

Activity: 1848
Merit: 1145


Piiiii Kaaaaaa Chuuuuuuu


View Profile
August 16, 2019, 09:17:03 AM
 #29

To this day no one replied to me with the password for the test encryption.

Apparently it is not possible to reverse a given encryption to it's known unecrypted state and find the password in the process.

How can someone even bruteforce it when you've already claimed it to be a very heavy password with at least 19 chars having everything from alphabets to numbers to symbols and even non alphabetical characters!

Why don't you try Dave's service as directed by LoyceV? We're literally not capable of getting your password to you because if it'd be so easy to get one, it'd be called a defect as well as defeat to the properties of cryptography and show that even this genre can't be trusted in terms of keeping our data/digital money safe. We don't have quantum computing technologies with us, else that prize would have been distributed till now.

Thanks to OP for this thread actually because this thing has made one thing clear to me (I was too confused about), that when you've got your seed phrase with you but you forget your password, it means that you've lost your chance on seeing your BTC again until you remember it or just get the privkeys if ever stored anywhere out of the wallet.

HCP
Legendary
*
Offline Offline

Activity: 1148
Merit: 1860

<insert witty quote here>


View Profile
August 19, 2019, 10:15:18 AM
 #30

Thanks to OP for this thread actually because this thing has made one thing clear to me (I was too confused about), that when you've got your seed phrase with you but you forget your password, it means that you've lost your chance on seeing your BTC again until you remember it or just get the privkeys if ever stored anywhere out of the wallet.
What? Huh Are you referring to the BIP39 passphrase? or the wallet password? Huh

If you're talking about the BIP39 passphrase, then yes... the seed mnemonic alone is not enough... you need mnemonic+passphrase to be able to recover your wallet. If you're talking about the wallet password, that is completely irrevelant, as you can simply restore your wallet from the seed mnemonic and put whatever new wallet password that you want.


roninhack2
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile WWW
August 19, 2019, 11:50:01 AM
 #31

Hello guys,

I am looking for a cryptographer who can help me out with Electrum encryption. I have the following situation:

I know the wallet in Electrum unecrypted.
I also know the same wallet in Electrum but encrypted with unknown password.

So I know 2 variables already.

My question is this:

Can I determine the unknown password by knowing the Unecrypted wallet and also knowing the same wallet but Encrypted?


Known Unecrypted wallet = sha256(sha256("unknown_password")) = Known Encrypted wallet

I will offer a 0.1 prize to anyone who messages me the password from following test instance:

Unecrypted test wallet: https://pastebin.com/yemmF3Te
Encrypted test wallet: https://pastebin.com/1nLV6n1P

Message me the password to prove your skills and we will continue to the next stage which is private and on another level. I am looking at 8 figures ahead. Yes 8.

Thanks

If your goal is detect password and if u accept bruteforce method yes ; i can proof it.
bartekjagoda
Jr. Member
*
Offline Offline

Activity: 72
Merit: 3


View Profile
August 19, 2019, 01:15:45 PM
 #32



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?

 C++ // Python development coder for hire
AdolfinWolf
Legendary
*
Offline Offline

Activity: 1218
Merit: 1077


people run from rain but sit in bathtubs of water


View Profile
August 19, 2019, 01:36:15 PM
 #33



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?
If he could do it he would've already done it and ran with the "Large amount of money" that is supposedly stored on the wallet.

alas, he can't do it.

roninhack2
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile WWW
August 19, 2019, 01:52:46 PM
Last edit: August 19, 2019, 02:33:47 PM by roninhack2
 #34



If your goal is detect password and if u accept bruteforce method yes ; i can proof it.

Then why don't you post it here so everyone knows you are not just talking?
If he could do it he would've already done it and ran with the "Large amount of money" that is supposedly stored on the wallet.

alas, he can't do it.

Guys calm down, im waiting rockyou.txt

Edit : seed is already avaible in unencrpyted wallet, i mean no need to money transfer etc, its just password challange.

Edit2 : i tried opencl with 7 gpu bruteforce ; 1024 iteration sha512 decrypt not efficient even if opencl. Also password not in the rockyou.txt list.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!