Author

Topic: 1 BTC bounty for password recovery (Read 257 times)

member
Activity: 180
Merit: 38
October 10, 2020, 11:51:12 AM
#9
Of course it's easy to understand that in most cases it will not be possible due to the amount of the truncated data in the hash cycle, for example 100 Megabyte in and 32 Bytes out in this case it would certainly be impossible to rediscover the 100 Megabytes from the given 32 Byte hash output.

you should learn to read the entire comments not just one word from it. there is a "condition" before "impossible".

Of course i did read the post otherwise i would not be posting here so here is the part i was referring to:


- length of the password (eg. 6 character, 8, 12, 20?)
- type of characters used (upper case, lower case, mix of both, symbols, which symbols if any, numbers)
 
not knowing these things simply means it is impossible

So here we are talking about a simple password and not a 100 Megabyte file.
A password can many times be shorter then 32 Bytes and in such case the amount of truncated data would be far less then in the 100 Megabyte case.
I have successfully rediscovered many passwords without knowing any of the above parameters.
The most important factors in such case are as always hash rate and the time spent searching.
I did not do this at home and i rented the hardware from a server company.
I just want to say that given enough time and hash power, it's not impossible, in stead it is inevitable that you will rediscover the password.
There is a very big difference between impossible and inevitable.
Impossible is never going to happen while inevitable is guaranteed to happen.


i would love to see the case where one breaks an encryption that used a randomly generated password without even knowing how long the password was.
please post links!

Why do so many people think that there is a url for everything.
I do not keep a blog of my activities.
And i don't want to because the process is simple anyone can set it up and try for themselves.
There are many tools available that can help but i always recommend writing your own from scratch.

In any case OP seems to have vanished (as expected)
legendary
Activity: 3472
Merit: 10611
October 05, 2020, 05:57:40 AM
#8
There are a lot of people on this board who are using the word impossible on a consistent basis.
you should learn to read the entire comments not just one word from it. there is a "condition" before "impossible".

Quote
in my case they have already been proven wrong many times because i already did what they are claiming to be impossible many times in the past.
i would love to see the case where one breaks an encryption that used a randomly generated password without even knowing how long the password was.
please post links!
member
Activity: 180
Merit: 38
October 05, 2020, 01:58:43 AM
#7
There are a lot of people on this board who are using the word impossible on a consistent basis.
It is safe to just ignore their writings because they are either easily proven wrong, or in my case they have already been proven wrong many times because i already did what they are claiming to be impossible many times in the past.
And i am sure that i am not the only one.
Why these people keep using the word impossible over and over again is beyond my understanding, perhaps they blindly assume and accept the calculations without ever trying themselves or they just copy paste what other members are claiming or they do not realize that there are people that are doing these impossible things while they are publishing their claims that it can not be done.

The problem i have with this topic and all the other topics that shine with a 'Bounty'  or 'Reward' at the top is that these bounty's never seem to get paid.
The topic either just dies out or the person who opened it just vanishes.
I can thus only join Timelord2067's point of view and have the funds proven to be available and locked into an escrow account.
 
jr. member
Activity: 189
Merit: 1
October 04, 2020, 07:06:54 PM
#6
 Hi if still have the computer with the text file that had the password then you can scan hard drive with this software.
You can download it here= https://www.wondershare.net/ad/all-data-recovery/data-recovery-new.html
Hopefully you can get your password.
HCP
legendary
Activity: 2086
Merit: 4361
October 04, 2020, 05:49:01 PM
#5
Let me know what else info should I add.
Unfortunately, this question needs to be asked... "Is it actually your wallet.dat? or is this a wallet.dat that you bought that is supposed to have XYZ BTC in it?" Huh

Please be honest, so that users don't waste time/money/resources on a fools errand, attempting to bruteforce the password to a "fake" wallet.dat. If it is actually your wallet.dat, then please provide the information requested by pooya87, as he stated, without more info, this is basically an "impossible" task. Undecided
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
October 04, 2020, 12:26:30 AM
#4
Which Escrow are you going to lodge the reward with, and, what duration will they hold the funds on your behalf while users are researching your password?
legendary
Activity: 3472
Merit: 10611
October 04, 2020, 12:24:45 AM
#3
Let me know what else info should I add.
in order to brute force anything you'll need to reduce the search space as much as possible which means knowing as much information as possible about the password for this case. for example these information would help a lot:
- length of the password (eg. 6 character, 8, 12, 20?)
- type of characters used (upper case, lower case, mix of both, symbols, which symbols if any, numbers)
- any character that you can remember would also reduce it by a lot.

not knowing these things simply means it is impossible to recover this password specially since you said it was created randomly which i'm assuming means using a password generator.
newbie
Activity: 13
Merit: 0
October 03, 2020, 12:35:24 PM
#2
Any hints on the password, or pattern used? Also, can you supply evidence this is your wallet?
newbie
Activity: 2
Merit: 0
October 03, 2020, 12:23:08 PM
#1
Hi, I need to recover password for my BTC wallet.dat.

I offer 1 BTC for password recovery and also I pay everyone who try do it after providing evidence.

Hash from bitcoin2john.py: $bitcoin$64$a95f920ca1fe7dc5ec9c1ac72cf80da3d6621abc4093e86e6ceebc1f5bad4c63$16$4b1887786d6d3451$67195$2$00$2$00

Password was randomly generated, saved in txt file for copy paste use - file with password is lost and I couldn't restore it.

Everyone who would like to participate, leave pattern which you use to let others know which pattern to skip.

Let me know what else info should I add.

Thank you.
Jump to: