Bitcoin Forum
April 26, 2024, 08:39:17 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Recover passphrase from an unencrypted wallet  (Read 160 times)
rtsam (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 10


View Profile
March 29, 2022, 12:48:43 AM
Last edit: March 29, 2022, 04:05:32 AM by rtsam
Merited by o_e_l_e_o (4), vapourminer (2), LoyceV (2)
 #1

So I have a paper wallet that has multiple wallets. BIP38 (with the same passphrase)

I do not have the passphrase / can't remember it. However, I have a empty wallet that was decrypted previously.

So my question, is it possible to figure out what passphrase was used from an decrypted private key (wif or base 58) and its encrypted counterpart?


Edit:


1A2weWHsxXB7dFHCc7TQNEauvsd3GzTvxD  (empty)

Private Key: L1VUccwGxwp1SqqXYkZamKjqcH4yD74oD4RBc26Lqwj5zu5rz4gg

Encrypted Private Key: 6PnPP4qkRMRNduWBY131PtbKFV3v9C4L7UxZF3ueZJFf48swuC6MDfPvCB

Passphrase: ?

So what I am hoping is possible, is that I am able to decode what passphrase would have been used to come up with that encrypted key. Working in reverse.





Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Btcspot
Jr. Member
*
Offline Offline

Activity: 186
Merit: 1


View Profile
March 29, 2022, 01:13:38 AM
 #2

 Hi what wallet is this, electrum, bitcoin core? Are they funded, first if its unencrypted yes maybe you can extract it.
rtsam (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 10


View Profile
March 29, 2022, 01:26:39 AM
Last edit: March 29, 2022, 02:56:57 AM by rtsam
 #3

bitcoin paper wallet created on bitaddress org

the unencrypted/previously decrypted wallet is empty

pooya87
Legendary
*
Offline Offline

Activity: 3430
Merit: 10504



View Profile
March 29, 2022, 04:18:19 AM
Merited by o_e_l_e_o (4), vapourminer (2)
 #4

You won't gain any practical edge by having both the private key and the encrypted key. All you could do to the algorithm is to skip the last conversion to address/public key but that step isn't taking that much time compared to the rest of the algorithm which is a lot more expensive.

In simple terms you have to recover the password for this BIP38 key just like you recover the password for any other BIP38 key, by brute forcing it. The only possible way of doing this is to either have a very short password or have some idea about what the password was like (random alphanumeric, dictionary words, symbols,...).

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
HCP
Legendary
*
Offline Offline

Activity: 2086
Merit: 4316

<insert witty quote here>


View Profile
March 29, 2022, 07:39:14 AM
 #5

pooya87 is totally on the money here... Unfortunately, knowing the "plain text" and "encrypted text" in this instance is of no benefit in determining what the encryption key is. You're not able to "work backwards" in this instance.

Your only option will be bruteforce.


█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
LoyceV
Legendary
*
Offline Offline

Activity: 3290
Merit: 16557


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
March 29, 2022, 11:06:22 AM
Merited by vapourminer (2)
 #6

So I have a paper wallet that has multiple wallets. BIP38 (with the same passphrase)
Do you have any idea how long the password is? BIP38 encryption is very slow to brute-force.
See I'm BIP38 curious, please help me out!: from 2015 to 2017 a reward that went up to $1000 wasn't enough to crack a BIP38 wallet with password "zLwMiR".

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
rtsam (OP)
Newbie
*
Offline Offline

Activity: 3
Merit: 10


View Profile
March 29, 2022, 01:30:03 PM
Merited by vapourminer (1), LoyceV (1)
 #7

So I have been attempted to brute force it for months. No luck. I thought I was lucky and a decrypted wallet would work to speed things up.

However I had an "a ha" moment this morning. I remembered I had this old banking password I used to use (but only for my bank that I no longer have)

I guess back then I thought... bitcoin... bank. And I must have used the same one thinking I would never forget it.

PS... it was 9 characters.


It worked. So I am good now! I need a drink.

Thanks guys!!
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!