Pages:
Author

Topic: 0.50 BTC reward for a valid password. - page 3. (Read 1774 times)

HCP
legendary
Activity: 2086
Merit: 4361
Provenance of the wallet.dat file notwithstanding...

Given the supplied password... the following "mask file" will try checking for basic typo's on each character first (including SHIFT not held properly when typing UPPERCASE/symbol, or SHIFT accidentally held when trying to type lowercase/number). Then it will test each position, one at a time, and try ANY possible character in that position.

NOTE: if there is more than one character incorrect, this will NOT work.

Code: (test.hcmask)
?s?d,?1#5cltEkfy/5z
?s?d,~?15cltEkfy/5z
?d?s,~#?1cltEkfy/5z
?l?u,~#5?1ltEkfy/5z
?l?u,~#5c?1tEkfy/5z
?l?u,~#5cl?1Ekfy/5z
?l?u,~#5clt?1kfy/5z
?l?u,~#5cltE?1fy/5z
?l?u,~#5cltEk?1y/5z
?l?u,~#5cltEkf?1/5z
?s?d,~#5cltEkfy?15z
?d?s,~#5cltEkfy/?1z
?l?u,~#5cltEkfy/5?1
?a#5cltEkfy/5z
~?a5cltEkfy/5z
~#?acltEkfy/5z
~#5?altEkfy/5z
~#5c?atEkfy/5z
~#5cl?aEkfy/5z
~#5clt?akfy/5z
~#5cltE?afy/5z
~#5cltEk?ay/5z
~#5cltEkf?a/5z
~#5cltEkfy?a5z
~#5cltEkfy/?az
~#5cltEkfy/5?a

Create a new file where hashcat.exe is... call it "test.hcmask"... copy/paste the above masks into it and save it.

The hashcat commandline should be:
Code:
hashcat.exe -m 11300 -a 3 $bitcoin$96$**** test.hcmask
NOTE: replace $bitcoin$96$**** with your actual wallet.dat hash extracted using bitcoin2john.py


Hashcat will then run through all the 1 character possibilities. If it doesn't work then, as noted above, there is more than one character that is incorrect... Undecided
member
Activity: 170
Merit: 58
Hey, I want to help - send me private message with hash or check mail - I sent you email today morning.
An account registered yesterday whose first post was offering help for $1.4M fund. You're tagged.


Yes, because before I was only reading. And I do not want to spend money on something (look others topics/websites which sells wallets) for what I probably have no resources.
This topic looks strange, indeed, but in fact I am interested in this subject to evaluate effectiveness of using new Amazon GPU workspaces - as I understand this is (maybe one of) solution used by other "wallet hackers". If author wants to find password himself - great,  but why not publish hash and just wait for successful answer?

hero member
Activity: 2268
Merit: 579
Vave.com - Crypto Casino
Hey, I want to help - send me private message with hash or check mail - I sent you email today morning.
An account registered yesterday whose first post was offering help for $1.4M fund. You're tagged.



I do not understand. I have a password that is not found. All spammers will be excluded without reward. I have a bitcoin wallet !!! I increase the reward to 1 BTC

I have a password ~#5cltEkfy/5z it does not work! I want to check every character. How to do it right?

2 people are denied rewards due to spam, I will not pay for empty messages.

I don't really care about your reward.
Anyway, no answer to the question who moved the BCH? You don't want to reveal information regarding the real owner of the wallet so I assume it was traded.
Who had access to the wallet in 2017?? Who are "they"?
You have to understand you cannot come here with a wallet filled with 1.4M USD and expect people to not be specious for all you say. A crime is not a joke.
I will be happy if the OP could provide a genuine answer to your question because the whole issue is fishy from the get go and if OP couldnt provide an honest answer then the wallet is among those wallet.dat with balance and lost password sold online these days.
member
Activity: 170
Merit: 58
Hey, I want to help - send me private message with hash or check mail - I sent you email today morning.
legendary
Activity: 2240
Merit: 3150
₿uy / $ell ..oeleo ;(

I do not understand. I have a password that is not found. All spammers will be excluded without reward. I have a bitcoin wallet !!! I increase the reward to 1 BTC

I have a password ~#5cltEkfy/5z it does not work! I want to check every character. How to do it right?

2 people are denied rewards due to spam, I will not pay for empty messages.

I don't really care about your reward.
Anyway, no answer to the question who moved the BCH? You don't want to reveal information regarding the real owner of the wallet so I assume it was traded.
Who had access to the wallet in 2017?? Who are "they"?
You have to understand you cannot come here with a wallet filled with 1.4M USD and expect people to not be specious for all you say. A crime is not a joke.
jr. member
Activity: 46
Merit: 1

I do not understand. I have a password that is not found. All spammers will be excluded without reward. I have a bitcoin wallet !!! I increase the reward to 1 BTC

I have a password ~#5cltEkfy/5z it does not work! I want to check every character. How to do it right?

2 people are denied rewards due to spam, I will not pay for empty messages.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
Of course, BSV didn't exist yet when those BCH transactions were made*.

Quote
The whole story start to be a bit fishy.
That is indeed the point I was trying to make. Maybe I was too subtle Tongue




* In case anyone wants the details:
Quote from: coindesk
Bitcoin Satoshi’s Vision was created out of the hard fork of Bitcoin Cash (BCH) on November 15, 2018.
legendary
Activity: 2240
Merit: 3150
₿uy / $ell ..oeleo ;(
You've spent the Bitcoin Cash without moving the real Bitcoin on October 30, 2017. Any chance you still have the private key imported into a BCH wallet you have forgotten about?
I had no business with Bitcoin cache, maybe they sent it from my wallet, as if I did not know, I need to look at the hard drive.
Who is "they"? Someone sent Bitcoin Cash from your address, and if you didn't do that, it means someone else has access to the wallet you claim is yours while you can't access it.

It's not only the BCH but BSV too > https://blockchair.com/bitcoin-sv/address/1GRth6rP4uaPXdw2T6HcGmi7f1RzW4xV94
Same date.
Seems strange to not have control over the address, but have accessed it earlier. The whole story start to be a bit fishy.
@OP I know the language barrier can make a lot of confusions. If you are using some kind of translation software like google translate, use a short and clear sentences, it will be a more accurate translation and it will be easier for us to understand.

⬇ Learned something new about this scamcoin, thanks Smiley
HCP
legendary
Activity: 2086
Merit: 4361
Tell me, is it possible to ask one character to perform a search and include the others that were found to check each of them in turn? Give me the right command to do this.
...
I want to insert my password from a text file and try one character at a time for an error, this may work.
Not sure exactly what you mean by try one character at a time. You have to test complete passwords... but do you mean you just want to check each character for error?

If so, then I believe the following might help. For instance, if you think your password was "ha$hc4t", but you think there might be a typo with the first character... you could try:

?aa$hc4t

This will try EVERY character (?a) at position 1... followed by "a$hc4t":

aa$hc4t
ba$hc4t
ca$hc4t
da$hc4t
ea$hc4t
fa$hc4t
...
etc etc

You could try that, and if not successful, you could try the 2nd char:

h?a$hc4t <--- "h" (test every character at position 2 with ?a) followed by "shcat":

ha$hc4t
hb$hc4t
hc$hc4t
hd$hc4t
he$hc4t
hf$hc4t
...
etc etc

And then try position 3, then position4 etc...


You can also create a ".hcmask" file, that includes all the masks you wanted to try...

Code: (example.hcmask)
?aa$hc4t
h?a$hc4t
ha?ahc4t
ha$?ac4t
ha$h?a4t
ha$hc?at
ha$hc4?a

Would try each of those masks, one after the other, exhausting all possible permutations before moving onto the next mask... you just use the file name in place of the mask in the commandline:
Code:
hashcat.exe -m 11300 -a 3 $bitcoin$96$**** example.hcmask
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
You've spent the Bitcoin Cash without moving the real Bitcoin on October 30, 2017. Any chance you still have the private key imported into a BCH wallet you have forgotten about?
I had no business with Bitcoin cache, maybe they sent it from my wallet, as if I did not know, I need to look at the hard drive.
Who is "they"? Someone sent Bitcoin Cash from your address, and if you didn't do that, it means someone else has access to the wallet you claim is yours while you can't access it.
jr. member
Activity: 46
Merit: 1
your string looks a bit incorrect... it shouldn't have all the spaces in it...

if you want to use a specific letter... you don't use ? at all... So, I'm not sure exactly what you are trying to use as your mask... but pretty much none of your ?'s make any sense... Huh Huh

So, that command as it is written isn't going to work.

Tell me, is it possible to ask one character to perform a search and include the others that were found to check each of them in turn? Give me the right command to do this.

You've spent the Bitcoin Cash without moving the real Bitcoin on October 30, 2017. Any chance you still have the private key imported into a BCH wallet you have forgotten about?

20% - 30 bitcoins is a lot of money to just give away.
You might be able to negotiate on that amount Smiley

I had no business with Bitcoin cache, maybe they sent it from my wallet, as if I did not know, I need to look at the hard drive.

Usually the command line scripts run under one core on the CPU, I think we could use crunch to generate the passwords by range and use the GNU parallel tool to find it faster.

I haven't tried yet, but i will make some experiments and share the results. This should make faster the HCP way.

I want to insert my password from a text file and try one character at a time for an error, this may work.

I didn't know why this conversation was about cracking the wallet through hashcat when the OP still has the wallet.dat file which still contains the wallet in the subject private key, i think it better to work on getting the private key and import in the wallet of your choice. Besides, this thread one and two will be helpful for you.
Meanwhile, I hope the OP is not among those that buy wallet.dat with balance and lost password online.

This is my wallet, there are a couple of days left until synchronization, and I will shoot the video, as well as the hash problems that I have. I am very close, I feel it.
hero member
Activity: 2268
Merit: 579
Vave.com - Crypto Casino
I didn't know why this conversation was about cracking the wallet through hashcat when the OP still has the wallet.dat file which still contains the wallet in the subject private key, i think it better to work on getting the private key and import in the wallet of your choice. Besides, this thread one and two will be helpful for you.
Meanwhile, I hope the OP is not among those that buy wallet.dat with balance and lost password online.
legendary
Activity: 3332
Merit: 3116
Usually the command line scripts run under one core on the CPU, I think we could use crunch to generate the passwords by range and use the GNU parallel tool to find it faster.

I haven't tried yet, but i will make some experiments and share the results. This should make faster the HCP way.
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
You've spent the Bitcoin Cash without moving the real Bitcoin on October 30, 2017. Any chance you still have the private key imported into a BCH wallet you have forgotten about?

20% - 30 bitcoins is a lot of money to just give away.
You might be able to negotiate on that amount Smiley
HCP
legendary
Activity: 2086
Merit: 4361
your string looks a bit incorrect... it shouldn't have all the spaces in it...

Code:
hashcat.exe -m 11300 -a 3 $bitcoin$96$**** hash?~?#?5?C?L?TEK?F?Y?/?5?r?
But it looks like you're getting the position of the ?'s wrong... and you don't quite get what the ?'s mean.

?l == lowercase letters (ie. abcdefghijklmnopqrstuvwxyz)
?u == uppercase letters (ie. ABCDEFGHIJKLMNOPQRSTUVWXYZ)
?d == numbers 1234567890
?s == symbols !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
?a == All of the above

if you want to use a specific letter... you don't use ? at all... So, I'm not sure exactly what you are trying to use as your mask... but pretty much none of your ?'s make any sense... Huh Huh

So, that command as it is written isn't going to work.
jr. member
Activity: 46
Merit: 1
While it is very difficult, I use this program https://www.thegrideon.com/bitcoin-password-recovery.html
That software has been mentioned on this forum a few times in the past. The info I could find is that it is closed-source and personally I wouldn't use it when there are better alternatives, like BTCrecover. Be careful what you use for such amounts.


Does BTCrecover refuse to work like a hash cat when I enter the string hashcat.exe -m 11300 -a 3 $ bitcoin $ 96 $ **** hash? ~? #? 5? C? L? T E K? F? Y? /? 5? r? this does not work. Now I am downloading the blockchain and making a video so that it is clear what I am doing.
legendary
Activity: 2730
Merit: 7065
While it is very difficult, I use this program https://www.thegrideon.com/bitcoin-password-recovery.html
That software has been mentioned on this forum a few times in the past. The info I could find is that it is closed-source and personally I wouldn't use it when there are better alternatives, like BTCrecover. Be careful what you use for such amounts.
jr. member
Activity: 46
Merit: 1

Thank you very much, I will try, but I'm not strong on the command line, I prefer the application GUI.
HCP
legendary
Activity: 2086
Merit: 4361
20% - 30 bitcoins is a lot of money to just give away.
Fair enough... but another way to look at it is that at the moment, you effectively have 0 bitcoins... which is better 0BTC or 120BTC? Wink Tongue


When I try to start this, nothing happens.
How to run a hashcat on a processor?
Ok, so what do you mean by "nothing happens"? Huh

To run hashcat, you need:

1. The password hash generated by the "bitcoin2john.py" script
2. Some idea of what your password is

Code:
hashcat.exe -m 11300 -a 3 <$bitcoin_hash_goes_here> 

For example you can test using the example hash from here that has the password 'hashcat':
Code:
hashcat.exe -m 11300 -a 3 $bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54$16$1563277210780230$158555$96$628835426818227243334570448571536352510740823233055715845322741625407685873076027233865346542174$66$625882875480513751851333441623702852811440775888122046360561760525 hash?l?l?l

-m 11300 == bitcoin wallet.dat format
-a 3 == bruteforce attack mode (word lists probably are not of use to you if you think you have a good idea of what your password actually is)
hash?l?l?l == password mask of text 'hash'+lowercase letter+lowercase letter+lowercase letter

That command should "quickly" find that the password is: hashcat
Quote
$bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54$16$1563277210780230$158555$96$628835426818227243334570448571536352510740823233055715845322741625407685873076027233865346542174$66$625882875480513751851333441623702852811440775888122046360561760525:hashcat

Session..........: hashcat
Status...........: Cracked
Hash.Name........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d...760525
Time.Started.....: Tue May 05 11:02:14 2020 (4 secs)
Time.Estimated...: Tue May 05 11:02:18 2020 (0 secs)
Guess.Mask.......: hash?l?l?l [7]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:     4581 H/s (1.43ms) @ Accel:4 Loops:64 Thr:1024 Vec:1
Recovered........: 1/1 (100.00%) Digests
Progress.........: 17576/17576 (100.00%)
Rejected.........: 0/17576 (0.00%)
Restore.Point....: 0/17576 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:158528-158554
Candidates.#1....: hashana -> hashqxq
Hardware.Mon.#1..: Temp: 51c Fan: 28% Util: 94% Core:1860MHz Mem:4513MHz Bus:16

Started: Tue May 05 11:02:07 2020
Stopped: Tue May 05 11:02:20 2020

Your issue will be defining the 'mask'... you need to know how many characters in your password, and the characters used... ie. lower case, uppercase, numbers, symbols etc, then you can build a mask using the following table:
Quote from: hashcat --help
- [ Built-in Charsets ] -

  ? | Charset
 ===+=========
  l | abcdefghijklmnopqrstuvwxyz
  u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
  d | 0123456789
  h | 0123456789abcdef
  H | 0123456789ABCDEF
  s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
  a | ?l?u?d?s
  b | 0x00 - 0xff

So, say you think your password is 8 chars long, and uses a mix of lower, UPPER, numbers and symbols... you would use: ?a?a?a?a?a?a?a?a

If you are 100% of the characters at a position, ie. you know 100% the password starts with WOW, you could use: WOW?a?a?a?a?a
or if you know it has 2 numbers on the end: ?a?a?a?a?a?a?d?d

Obviously, the more specific you can be with your mask, the smaller the keyspace that needs to be searched and the less time it will take to find.

Refer here for more info regarding mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack


NOTE: if you find you are getting "Token Length Exception" errors when trying to run hashcat, try using the BETA version from here: https://hashcat.net/beta/
legendary
Activity: 3374
Merit: 3095
BTC price road to $80k
While it is very difficult, I use this program https://www.thegrideon.com/bitcoin-password-recovery.html




Honestly, I never heard the tool from thegrideon.com it seems a software that can brute-force the password of wallet.dat file.
Make sure to run this software on offline mode for your wallet safe.

Alternatively use BTCrecovery which is already mentioned above.

Why not watch a video on youtube how to use the BTCrecovery?

Here are some videos that you can follow
- Recover your lost Bitcoin password with btcrecover - Install Guide
- Recover your Bitcoin Core wallet password with btcrecovery
Pages:
Jump to: