Bitcoin Forum
November 09, 2024, 06:29:22 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Old copay.aes backup importing  (Read 84 times)
saekki (OP)
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
January 17, 2021, 12:43:07 PM
 #1

Hi,

I'm trying to import an old copay.aes wallet backup which I last used at 2015. I can import it to Bitpay wallet using a password, see my balance, but when I try to do a transaction it again asks for encrypt password, but since the same password I used before is not accepted this must be different, and I can't remember what it could be. Is there any way to recover funds using copay.aes-file and a password which I use to import it?

Bitpay-wallet does not show which addresses are used to store the funds, but I somehow managed to calculate the public address using one of the keys on the encrypted aes-file, can't even remember now which (xpub?).
saekki (OP)
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
January 17, 2021, 01:38:13 PM
 #2

I can get to the point where I have to confirm transfer. It asks for a "encrypt password", which can be reset using 12 word recovery phrase, which I don't think I have either.
odolvlobo
Legendary
*
Offline Offline

Activity: 4494
Merit: 3403



View Profile
January 17, 2021, 10:55:08 PM
 #3

I can get to the point where I have to confirm transfer. It asks for a "encrypt password", which can be reset using 12 word recovery phrase, which I don't think I have either.

https://support.bitpay.com/hc/en-us/articles/115003004403-I-forgot-my-wallet-s-encrypted-password-What-can-I-do-

Join an anti-signature campaign: Click ignore on the members of signature campaigns.
PGP Fingerprint: 6B6BC26599EC24EF7E29A405EAF050539D0B2925 Signing address: 13GAVJo8YaAuenj6keiEykwxWUZ7jMoSLt
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4361

<insert witty quote here>


View Profile
January 18, 2021, 04:35:08 AM
Last edit: January 18, 2021, 04:49:52 AM by HCP
 #4

If you don't have the 12 word recovery phrase, then your only option is to remember what your encrypt password was.

Depending on the .aes file, you might be able to extract a hash from the file and use something like hashcat to bruteforce it, but you'd need to have some idea of what the password you used was (password length, types of characters/numbers/symbols used, random chars or words? etc)


Failing that, I found this link for the "bitcoin.com wallet", which was a fork of CoPay... they say that the wallet backups were encrypted using SJCL... and that you can use the online demo to try and decode it using your "password".


Obviously, the usual caveats of using "online" pages with sensitive data like passwords/keys/wallet files etc apply Wink You should be able to save the page and run it offline.

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
saekki (OP)
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
January 18, 2021, 10:13:48 AM
 #5

Depending on the .aes file, you might be able to extract a hash from the file and use something like hashcat to bruteforce it, but you'd need to have some idea of what the password you used was (password length, types of characters/numbers/symbols used, random chars or words? etc)

Thanks, I think I have the wallet file itself decrypted with the right password, the same I use for importing the wallet. And I found some random numbers and letters for example walletPrivKey, xPubKey and xPrivKeyEncrypted, which I'd guess at least some of are hashes. I'd think the next step would be trying to brute force these. I tried hashcat as you suggested and even got it working with simple test hashes, but all these different hashes and salts are getting over my head.  Cheesy
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!