Pages:
Author

Topic: 0.1 BTC prize - Find Electrum pass by knowing both unecrypted+encrypted wallet? - page 2. (Read 1183 times)

newbie
Activity: 11
Merit: 18
I accept the situation.

However I'd like to try the bruteforce to a certain extent, at least to be content that I tried that option too.

Can anyone direct me to a bruteforce tool for electrum, preferably one that I can set up my own alphabet.

Or a dictionary one, where I can load a password list from text or csv.

If it's good I will tip in btc.

Thanks
copper member
Activity: 1652
Merit: 1901
Amazon Prime Member #7
The password to the test encryption contains a mix of 19 chars lower case letters / Upper case letters / numbers / and a few non alphanumeric chars. No reference to any word in any dictionary. The only way to crack it is via bruteforce in tens of years,
With modern technology, it will take a lot longer than tens of years to crack the password you describe. For all intents and purposes, the password will not be broken.



1.
I have wallet1, where seed and xprv are both encrypted with strong password, I can see the balance and it's gianormous by anyone's standards. Wallet1 cannot be cracked by nothing, dictionary and bruteforce are out of the question. Possibly bruteforce, but length of password is unknown, and I'd like to be realistic and not go that route which will lead to alot of time wasted and eventual disapointment.

In order to have any realistic chance of bruteforcing the password, it would need to be no longer than 12 characters in length, or with there being 12 unknown characters of the password if you know a portion of it.

If the wallet has ever been saved unencrypted on a device you have access to, you may be able to recover a portion of the seed or xprivkey using forensics software. If this is true, you should unplug the device immediately, and use a separate device to research how to best use computer forensics (most likely employing an expert) to look for a portion of the seed. If the unencrypted wallet was on a device a long time ago that has been used extensively in the meantime, it is unlikely you will recover any part of the seed/wallet file.

IMO, your best bet is to narrow down the password by obtaining a portion of the description of the password, such as that it starts with 'abc', ends with four numbers, or anything else you can obtain/remember, and brutforcing the password with these assumptions narrowing down the possibilities.
newbie
Activity: 11
Merit: 18

For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


It would be more accurate to describe the decryption key (the password) as being on a 3-dimential plane. In your example, you can determine the solution to "X" however you do not know where on the "Z" plane the solution is, and there is an unlimited number of places on the Z axis the solution could be. Even having multiple plaintext sets will not help you.


I am going to speculate you are in a position that can be described as below:
You have an electrum wallet ("Wallet 1") that you do not have the password to
You have a second electrum wallet ("Wallet 2") that you know has the same password as Wallet 1
You have a decrypted copy of Wallet 2, possible from an old backup.
Wallet 1 has a lot of coin in it

Depending on how complex your password is, and how much you know about your password, you may be able to brute force the password via automated means. There are a number of software programs and service providers that can try to guess your password, and know if it figures it out.

For example, if you know your password is 10 digits, and is a combination of uppercase, lowercase letters and numbers that are something close to "random" there are a 8.39 * 1017 possibilities of what your password could be. However if you know your password starts with the uppercase letter "P" followed by 9 numbers that are something close to random, the number of possibilities drops to 1 * 108.


You are a smart guy, and the first to understand the situation presented.

1.
I have wallet1, where seed and xprv are both encrypted with strong password, I can see the balance and it's gianormous by anyone's standards. Wallet1 cannot be cracked by nothing, dictionary and bruteforce are out of the question. Possibly bruteforce, but length of password is unknown, and I'd like to be realistic and not go that route which will lead to alot of time wasted and eventual disapointment.
2.
I have wallet 2, unecrypted and encrypted, password for encryption unknown, but 99% chance to match the one at wallet1 as it was set up by the same entity. This in my mind was the best shot I had at getting the password for wallet1 as I supposed I could reverse the equation in some way unknown to me till I started this topic. Apparently this is categorized as an attack and a serious breach if it was possible, so right now I am pretty much content with the situation unless something else comes up. I am doing pretty well in life, I am heavily invested in BTC and also an early adopter, but the amount present in wallet1 is enough motivation for anyone to try and do something about it, no matter the cost.
newbie
Activity: 11
Merit: 18
I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof. I'm tempted to give you neg trust for that post.

you can duplicate his screenshot by using the seed phrase OP posted in first link:
Code:
purpose horse hundred around young explain aspect off almost where lawn number

the only way he could have found the password is if the password was something simple like 123 and he simply went through the common passwords to decrypt it!

That's correct, he duplicated the wallet by entering the seed in Electrum, which was already public, nothing secret about it...

He said that the password was "bitcoin" however anyone can test that "bitcoin" will NOT decrypt the password at the encrypted test wallet: https://pastebin.com/1nLV6n1P

Some random kid wasting time here.

The password to the test encryption contains a mix of 19 chars lower case letters / Upper case letters / numbers / and a few non alphanumeric chars. No reference to any word in any dictionary. The only way to crack it is via bruteforce in tens of years, OR if anyone finds a way to retrieve the password from the 2 wallets.
legendary
Activity: 3472
Merit: 10611
I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof. I'm tempted to give you neg trust for that post.

you can duplicate his screenshot by using the seed phrase OP posted in first link:
Code:
purpose horse hundred around young explain aspect off almost where lawn number

the only way he could have found the password is if the password was something simple like 123 and he simply went through the common passwords to decrypt it!
legendary
Activity: 4466
Merit: 3391
I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:

You may have determined the encryption key, but that's not proof.
legendary
Activity: 3332
Merit: 3116
Hello guys,

I am looking for a cryptographer who can help me out with Electrum encryption. I have the following situation:

I know the wallet in Electrum unecrypted.
I also know the same wallet in Electrum but encrypted with unknown password.

So I know 2 variables already.

My question is this:

Can I determine the unknown password by knowing the Unecrypted wallet and also knowing the same wallet but Encrypted?


Known Unecrypted wallet = sha256(sha256("unknown_password")) = Known Encrypted wallet

I will offer a 0.1 prize to anyone who messages me the password from following test instance:

Unecrypted test wallet: https://pastebin.com/yemmF3Te
Encrypted test wallet: https://pastebin.com/1nLV6n1P

Message me the password to prove your skills and we will continue to the next stage which is private and on another level. I am looking at 8 figures ahead. Yes 8.

Thanks

I already find the password, i will message it to you right now, feel free to send the BTC to the bitcoin addy i have in my profile. As proof i will leave the screenshot here:


Good luck for all those who try it  Wink

Update:

My answer was wrong, and i just explain what happened here: https://bitcointalksearch.org/topic/m.51835282
legendary
Activity: 4466
Merit: 3391
same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.

It may seem doable on paper according to your analogy, but your analogy massively under-represents the actual difficulty. The Wikipedia article on AES (https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) should put it in perspective.
copper member
Activity: 1652
Merit: 1901
Amazon Prime Member #7

For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


It would be more accurate to describe the decryption key (the password) as being on a 3-dimential plane. In your example, you can determine the solution to "X" however you do not know where on the "Z" plane the solution is, and there is an unlimited number of places on the Z axis the solution could be. Even having multiple plaintext sets will not help you.


I am going to speculate you are in a position that can be described as below:
You have an electrum wallet ("Wallet 1") that you do not have the password to
You have a second electrum wallet ("Wallet 2") that you know has the same password as Wallet 1
You have a decrypted copy of Wallet 2, possible from an old backup.
Wallet 1 has a lot of coin in it

Depending on how complex your password is, and how much you know about your password, you may be able to brute force the password via automated means. There are a number of software programs and service providers that can try to guess your password, and know if it figures it out.

For example, if you know your password is 10 digits, and is a combination of uppercase, lowercase letters and numbers that are something close to "random" there are a 8.39 * 1017 possibilities of what your password could be. However if you know your password starts with the uppercase letter "P" followed by 9 numbers that are something close to random, the number of possibilities drops to 1 * 108.
newbie
Activity: 11
Merit: 18
This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.
That's not at all how AES works. It isn't just an equation. Sure it may sound like that would work, but AES is not some mathematical equation that you can perform such actions on.

What you are describing is called a Known Plaintext Attack. There are no known Known Plaintext Attacks on AES so what you are asking is currently impossible to do.

On paper it sounds very do-able to me
It is clear that you do not understand cryptography if this sounds doable to you. Because you don't understand cryptography, I would suggest that you don't make such assumptions as they are likely to be wrong.

Thanks alot! I tipped to your address.

Obviously I am a crypto noob, I never pretended that I know anything especially related to my request, it's the reason why I started this topic in the first place.

I just hoped that the way I presented it, like in an equation will make sense in cryptography too, it was a long shot but I had to try. Especially since alot of btc was involved Sad

I never knew this is called "Known-plaintext attack" I've looked into the wikipedia page and it makes alot of sense now.

I wish I could share with you my motives behind this, it was really alot of money involved.

Thanks anyway
staff
Activity: 3458
Merit: 6793
Just writing some code
This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.
That's not at all how AES works. It isn't just an equation. Sure it may sound like that would work, but AES is not some mathematical equation that you can perform such actions on.

What you are describing is called a Known Plaintext Attack. There are no known Known Plaintext Attacks on AES so what you are asking is currently impossible to do.

On paper it sounds very do-able to me
It is clear that you do not understand cryptography if this sounds doable to you. Because you don't understand cryptography, I would suggest that you don't make such assumptions as they are likely to be wrong.
newbie
Activity: 11
Merit: 18
That simply is impossible since AES-256 (the encryption that Electrum uses) is a modern cipher which is resistant to known-plaintext attacks and it has been designed in a way to resist this type of attack specifically since in most use cases of it we already assume that the plaintext is known.

This is not a common situation, it's like an equation where we know 2 variables and the 3rd is unknown.

For example when an electrum wallet is crypted we got the following:

2 + 3 = X,                 we know that x is 5 cause we know the first 2 numbers, same with electrum when doing encryption:

unencrtyped_wallet + password_encryption = X,

------------------
but in this case we got something like this:

2 + X = 5,                 we can also find X because X = 5 - 2

same should be applicable to my situation:

unecrypted_wallet + X = encrypted_wallet


I need to find password X by knowing the wallet in it's 2 states, both unecrypted and also encrypted with password X. On paper it sounds very do-able to me. We got 2 known parts of a 3 part equation.

BOTTOM LINE

I am looking at a very large sum of money, if anyone can pass my test I will pay that 0.1 which is literally nothing, the most important aspect is that we will continue in private where I present the winner of the test to the real situation.

Let's just say I will pay easily 30 BTC or whatever the price of a Lambo Aventador is.
legendary
Activity: 1040
Merit: 2785
Bitcoin and C♯ Enthusiast
That simply is impossible since AES-256 (the encryption that Electrum uses) is a modern cipher which is resistant to known-plaintext attacks and it has been designed in a way to resist this type of attack specifically since in most use cases of it we already assume that the plaintext is known.
newbie
Activity: 11
Merit: 18
Hello guys,

I am looking for a cryptographer who can help me out with Electrum encryption. I have the following situation:

I know the wallet in Electrum unecrypted.
I also know the same wallet in Electrum but encrypted with unknown password.

So I know 2 variables already.

My question is this:

Can I determine the unknown password by knowing the Unecrypted wallet and also knowing the same wallet but Encrypted?


Known Unecrypted wallet = sha256(sha256("unknown_password")) = Known Encrypted wallet

I will offer a 0.1 prize to anyone who messages me the password from following test instance:

Unecrypted test wallet: https://pastebin.com/yemmF3Te
Encrypted test wallet: https://pastebin.com/1nLV6n1P

Message me the password to prove your skills and we will continue to the next stage which is private and on another level. I am looking at 8 figures ahead. Yes 8.

Thanks
Pages:
Jump to: