Bitcoin Forum
May 06, 2024, 09:10:12 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 »
  Print  
Author Topic: Encrypted wallet.dat, lost password, any solutions?  (Read 213393 times)
ez1btc (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
June 05, 2012, 01:26:15 AM
 #1

Apparently I misrecorded my encrypted wallet.dat password. As such, I have lost access to a large amount of Bitcoins.  I can't imagine there is any recourse for hacking apart my wallet.dat and recovering any private keys, but if there is, I'll make it worth your while.

If anyone has any solutions to a lost wallet password, please let me know- I'm offering a 50-100BTC bounty for helping me unlock my lost BTC as soon as possible.

Thanks all
ez1btc
1714986612
Hero Member
*
Offline Offline

Posts: 1714986612

View Profile Personal Message (Offline)

Ignore
1714986612
Reply with quote  #2

1714986612
Report to moderator
1714986612
Hero Member
*
Offline Offline

Posts: 1714986612

View Profile Personal Message (Offline)

Ignore
1714986612
Reply with quote  #2

1714986612
Report to moderator
1714986612
Hero Member
*
Offline Offline

Posts: 1714986612

View Profile Personal Message (Offline)

Ignore
1714986612
Reply with quote  #2

1714986612
Report to moderator
TalkImg was created especially for hosting images on bitcointalk.org: try it next time you want to post an image
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Revalin
Hero Member
*****
Offline Offline

Activity: 728
Merit: 500


165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g


View Profile
June 05, 2012, 01:29:23 AM
 #2

Do you remember any part of your password?  How many characters was it?  Any other aspects, like all-lowercase, or made of several words, or was it just random?

If we can narrow it down some it might be possible to brute force it.

      War is God's way of teaching Americans geography.  --Ambrose Bierce
Bitcoin is the Devil's way of teaching geeks economics.  --Revalin 165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g
etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 05, 2012, 01:34:34 AM
 #3

Given enough time, it can be found.  But the system is designed to make brute forcing the password slower...

RIGHT NOW write down anything you can remember about the password.  Length, characters, patterns that are probably in the password.  Not only might this jog your memory, but it could reduce the search time by a factor of 1,000,000, and could be the difference between figuring it out eventually, or not at all.

Unfortunately, I don't have the time to attempt this, but I know there are folks out there who would.  Just be aware that unless you are "buying a script" to run on your own system, you will most likely be giving your wallet to someone and there's no guarantee that you'll get anything back once they find the password.  In other words, I would only send the wallet to members with a reputation at stake.

(I mean, there's no guarantees with anyone on the forums, but at some point you have to trust someone if the alternative is losing the coins forever)


Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
ez1btc (OP)
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
June 05, 2012, 01:38:34 AM
 #4

the password is quite memorable, which is why im surprised i misrecorded it- it is very long but a unique phrase and i must have misentered it twice while confirming it as my password.

so yes, i have a good idea of what the password is close to, and i would love for a reputable, trustworthy member to help me brute force it.

i will pay well Smiley

thanks again all
drrussellshane
Hero Member
*****
Offline Offline

Activity: 546
Merit: 500


View Profile
June 05, 2012, 01:54:11 AM
 #5

the password is quite memorable, which is why im surprised i misrecorded it- it is very long but a unique phrase and i must have misentered it twice while confirming it as my password.

so yes, i have a good idea of what the password is close to, and i would love for a reputable, trustworthy member to help me brute force it.

i will pay well Smiley

thanks again all

Why not search and find a password cracker that will brute force it for you, starting with your *intended* password?

I'm not familiar with any particular piece of such software, but I'm sure it exists, and is likely found with relative ease given a diligent search.

Feel free to send your bounty my way though. Grin

Buy a TREZOR! Premier BTC hardware wallet. If you're reading this, you should probably buy one if you don't already have one. You'll thank me later.
Blazr
Hero Member
*****
Offline Offline

Activity: 882
Merit: 1005



View Profile
June 05, 2012, 01:58:02 AM
 #6

the password is quite memorable, which is why im surprised i misrecorded it- it is very long but a unique phrase and i must have misentered it twice while confirming it as my password.

so yes, i have a good idea of what the password is close to, and i would love for a reputable, trustworthy member to help me brute force it.

i will pay well Smiley

thanks again all

Why not search and find a password cracker that will brute force it for you, starting with your *intended* password?

I'm not familiar with any particular piece of such software, but I'm sure it exists, and is likely found with relative ease given a diligent search.

Feel free to send your bounty my way though. Grin

You would still need powerful hardware in order to crack it within a reasonable amount of time

etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 05, 2012, 01:59:16 AM
 #7

Given what you just said, I would guess that you know all the words that are in the password.  Therefore, the issue is most likely capitalization and/or punctuation.  Especially punctuation and numbers, which can easily be mistyped, or accidentally double-capitalizing like "WAlrus".  Or maybe a spacebar was tapped twice, or you have a "teh" in there.

It sounds like there's a lot of BTC there, so I would first spend a couple hours trying slight variations of it.  A couple hours seems like a lot, but that's the price you pay for forgetting your password!  And it's worth it if it actually works, because then you don't have to risk giving the wallet to anyone else.  And it might be faster than downloading and figuring out how to use some poorly made software specifically designed for cracking Satoshi wallet passwords but it doesn't quite work right...


Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
FreeMoney
Legendary
*
Offline Offline

Activity: 1246
Merit: 1014


Strength in numbers


View Profile WWW
June 05, 2012, 02:05:18 AM
 #8

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

Play Bitcoin Poker at sealswithclubs.eu. We're active and open to everyone.
memvola
Hero Member
*****
Offline Offline

Activity: 938
Merit: 1002


View Profile
June 05, 2012, 02:09:05 AM
 #9

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

I guess you could just send the encrypted master key?
rudrigorc2
Legendary
*
Offline Offline

Activity: 1064
Merit: 1000



View Profile
June 05, 2012, 02:09:40 AM
Last edit: June 05, 2012, 04:38:27 AM by rudrigorc2
 #10

if it really was you who put the password the best piece of hardware you can use right now is your brain

relax and try to recreate the whole scenario, time, place, mindset of when you were leaning on the bitcoin client, then put your hands on the keyboard, focus and start trying

hopefully the password will emerge

source: my own experience, I have set up a password on a 50 btc worth wallet. This is how it happened:

It was late night in a hostel, the only computer avaiable, not only a public a PC but I had to use standing up, and, to increase the anxiety level, I was drinking beer. Put the password and shutdown the PC. Then I left the place I was for three days, here is where I needed the password and: WTF?! Wrong password! Don't panic.  At this time the password only existed on my brain, then just said to myself I was going to remeber. I did exactly as I told you above. Took me one day to go back to the place I had set up the password. And two more days acting like "12:01" movie to finally extract it from my mind. The pass was a 12 chars long phrase.

Hope this inspires you. Cheesy
etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 05, 2012, 02:13:58 AM
 #11

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

"Commutative encryption" does exist, but wallet encryption uses AES which is not.  And even if it did, I'm not sure there would be a way for the cracker to know when he's found the correct passphrase.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
payb.tc
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1000



View Profile
June 05, 2012, 02:18:48 AM
 #12

the password is quite memorable, which is why im surprised i misrecorded it- it is very long but a unique phrase and i must have misentered it twice while confirming it as my password.

have you tried hunter2?

seriously though, this might help: sometimes the above happens to me when i use a keyboard with a bad right-hand shift key, causing all the $ in my passphrases to come out as 4's every time i type it.
etotheipi
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 05, 2012, 02:30:23 AM
 #13

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

"Commutative encryption" does exist, but wallet encryption uses AES which is not.  And even if it did, I'm not sure there would be a way for the cracker to know when he's found the correct passphrase.

This may be a way to improve the encrypted wallet format.   Passphrase to key function ->  key.  Then have the client encrypt separately a "test string" and the wallet.

This would allow brute force recovery in a secure manner.  The person could just give only the encrypted test string (which given the right key should decrypt to a known value (something like "Bitcoin Wallet format v1.2") to recovery team.

It wouldn't simplify the attacker's job but it would allow forgotten/incorrect passwords to be recovered in a manner that doesn't require the owner to trust a third party.

+1

That's such a good idea I'm going to make it part of my new wallet format in Armory.  This kind of thing happens infrequently, but enough.

Although, Armory has the advantage that you usually have a paper backup which is unencrypted.  When you forget your passphrase, you only need to restore your wallet from the sheet of paper.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
payb.tc
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1000



View Profile
June 05, 2012, 02:31:00 AM
 #14

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

"Commutative encryption" does exist, but wallet encryption uses AES which is not.  And even if it did, I'm not sure there would be a way for the cracker to know when he's found the correct passphrase.

This may be a way to improve the encrypted wallet format.   Passphrase to key function ->  key.  Then have the client encrypt separately a "test string" and the wallet.

This would allow brute force recovery in a secure manner.  The person could just give only the encrypted test string (which given the right key should decrypt to a known value (something like "Bitcoin Wallet format v1.2") to recovery team.

It wouldn't simplify the attacker's job but it would allow forgotten/incorrect passwords to be recovered in a manner that doesn't require the owner to trust a third party.



that would be awesome... you could then distribute it to potentially thousands, millions of 'lost pass' solvers who are paid bounties for the keys they find.

koin
Legendary
*
Offline Offline

Activity: 873
Merit: 1000


View Profile
June 05, 2012, 02:39:43 AM
 #15

this is probably being too paranoid, but ... plan on choosing only one person to attempt to figure out how your passphrase is failed.  what if you have one person try to figure it out but claims to have failed.  and then a second person gives it a try and also claims to have failed, or is still working on it.  but then the bitcoins get spent.  which party do you point blame?

game theory would probably have an answer for that but if there is only one party (or at least that person does not know there are any other parties trying the same thing) then chances are less likely that you'll get cheated.
FreeMoney
Legendary
*
Offline Offline

Activity: 1246
Merit: 1014


Strength in numbers


View Profile WWW
June 05, 2012, 02:42:41 AM
 #16

Just out of curiosity is there any theoretical way to put another password on a file before handing it off to someone yet still have them able to know if they've found the original?

"Commutative encryption" does exist, but wallet encryption uses AES which is not.  And even if it did, I'm not sure there would be a way for the cracker to know when he's found the correct passphrase.

This may be a way to improve the encrypted wallet format.   Passphrase to key function ->  key.  Then have the client encrypt separately a "test string" and the wallet.

This would allow brute force recovery in a secure manner.  The person could just give only the encrypted test string (which given the right key should decrypt to a known value (something like "Bitcoin Wallet format v1.2") to recovery team.

It wouldn't simplify the attacker's job but it would allow forgotten/incorrect passwords to be recovered in a manner that doesn't require the owner to trust a third party.

+1

That's such a good idea I'm going to make it part of my new wallet format in Armory.  This kind of thing happens infrequently, but enough.

Although, Armory has the advantage that you usually have a paper backup which is unencrypted.  When you forget your passphrase, you only need to restore your wallet from the sheet of paper.

Nice idea Tangible.

Play Bitcoin Poker at sealswithclubs.eu. We're active and open to everyone.
Revalin
Hero Member
*****
Offline Offline

Activity: 728
Merit: 500


165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g


View Profile
June 05, 2012, 02:48:19 AM
 #17

Rather than giving your whole wallet over to someone, just extract one keypair, preferably one for an address with 0 balance.  They can then crack it, but won't have access to all of your funds when they succeed.

      War is God's way of teaching Americans geography.  --Ambrose Bierce
Bitcoin is the Devil's way of teaching geeks economics.  --Revalin 165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g
Etlase2
Hero Member
*****
Offline Offline

Activity: 798
Merit: 1000


View Profile
June 05, 2012, 03:12:36 AM
 #18

Rather than giving your whole wallet over to someone, just extract one keypair, preferably one for an address with 0 balance.  They can then crack it, but won't have access to all of your funds when they succeed.

Are the public keys unencrypted? Huh Otherwise it would be difficult to find an address with a 0 balance I would think.

FreeMoney
Legendary
*
Offline Offline

Activity: 1246
Merit: 1014


Strength in numbers


View Profile WWW
June 05, 2012, 03:22:42 AM
 #19

Oh, I keep imagining a plain encrypted file. If all the parts are in place and just the keys are encrypted then I think it makes sense to just pull one. Is the key pool encrypted? Is it easy to tell which are in the key pool? Pull one (for each cracker?) from the key pool and have a contest?

Play Bitcoin Poker at sealswithclubs.eu. We're active and open to everyone.
Revalin
Hero Member
*****
Offline Offline

Activity: 728
Merit: 500


165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g


View Profile
June 05, 2012, 03:41:23 AM
 #20

The encrypted wallet format only encrypts the seckeys, nothing else.

You can dump them with bitcointools: https://github.com/gavinandresen/bitcointools

ez1btc: to export the full encrypted seckeys, just make this change to wallet.py:

Code:
diff --git a/wallet.py b/wallet.py
index a41d3a6..9eae0ad 100644
--- a/wallet.py
+++ b/wallet.py
@@ -224,7 +224,7 @@ def dump_wallet(db_env, print_wallet, print_wallet_transactions, transaction_fil
       print(" Created: "+time.ctime(d['created'])+" Expires: "+time.ctime(d['expires'])+" Comment: "+d['comment'])
     elif type == "ckey":
       print("PubKey "+ short_hex(d['public_key']) + " " + public_key_to_bc_address(d['public_key']) +
-            ": Encrypted PriKey "+ short_hex(d['crypted_key']))
+            ": Encrypted PriKey "+ long_hex(d['crypted_key']))
     elif type == "mkey":
       print("Master Key %d"%(d['nID']) + ": 0x"+ short_hex(d['crypted_key']) +
             ", Salt: 0x"+ short_hex(d['salt']) +

Then run "./dbdump.py --wallet | grep PriKey".  That will give you the full list, and you can pick which one you want to share.

      War is God's way of teaching Americans geography.  --Ambrose Bierce
Bitcoin is the Devil's way of teaching geeks economics.  --Revalin 165YUuQUWhBz3d27iXKxRiazQnjEtJNG9g
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!