Pages:
Author

Topic: BitCrack - A tool for brute-forcing private keys - page 75. (Read 74414 times)

full member
Activity: 427
Merit: 105
i want? cool. i take em all, so kangaroo yes...
if a bsgs i always loved, superb lists of keys boom there in a jiffy,
with not to much crap on the screen, just the needed, only memory?
pubkeys as you know around 120bits puzzle version right now. got some my own,
but that beside this all.

full member
Activity: 1050
Merit: 219
Shooters Shoot...
Can someone throw off the working version of pikachunakapika / bitcrack??? I searched the Internet and cannot find anywhere. need a random function. on https://github.com/ deleted. Please friends help.
Your best bet is to create a batch file that does the random for you. The random function in the version you are speaking about is slower because it takes more time to regen the randomness than to just go in sequential order. A batch function lets you jump in and out of ranges randomly. I have python script that writes batch script with random ranges. You can select the low and high of the range for example:
Low:  8B00000
High: 8BFFFFF

So the script will randomly generate a start and end range inside of that range. Or, use the --share option for "randomness"

Share the script. Itself could not write as it should.

Here is the python script (I run python 2.7 on Windows):
Code:
# Randomizer for BitCrack
# Amateur Coding by the Wandering Philosopher

import os
import random
from datetime import datetime
random.seed(datetime.now())

arq1 = open('RandomBitCrack.bat', 'w')
y = ("FFFFF")
Y1 = int(y, 16)

arq1.write(":while1" + '\n')
for x in range(20):
    
    low  = 0x000000000000000000000000000000000000000000000000ED00000000000000
    high = 0x000000000000000000000000000000000000000000000000EDFFFFFFFFFFFFFF
    blah1 = random.randrange(low, high)
    blah = str( hex( random.randrange( low, high ) ) ).rstrip("L").replace("0x", "00000000000000000000000000000000000000000000000")
    eazy = hex(blah1 + Y1).rstrip("L").lstrip("0x")
    arq1.write("start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace " + hex(blah1).rstrip("L").lstrip("0x") +":" + eazy + " -i 64.txt -o FOUNDTHEPRIVATEKEY.txt" + '\n' + "timeout /t 6 /nobreak" + '\n' + "taskkill /im cb1.exe /f" + '\n' + "timeout /t 1 /nobreak" + '\n')
    
arq1.close()

Batch file produced:
Code:
:while1
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9f957a417cae:ed5f9f957a517cad -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5ce1cdf696c89f:ed5ce1cdf6a6c89e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede87bf0498ffc93:ede87bf0499ffc92 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed4482d8f1e25b9e:ed4482d8f1f25b9d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbd36f37234898c:edbd36f37244898b -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8511d049941d6f:ed8511d049a41d6e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9b5cd289b8ef:ed5f9b5cd299b8ee -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8a07e85d77b716:ed8a07e85d87b715 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed91263ac5f6d2ca:ed91263ac606d2c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1d4a9023dd6bfb:ed1d4a9023ed6bfa -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed72d72cee1da3ca:ed72d72cee2da3c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1b50d6fc437042:ed1b50d6fc537041 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed71ac3573476040:ed71ac357357603f -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed2ac546cac9806e:ed2ac546cad9806d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace eddf6d5744433345:eddf6d5744533344 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edb5ca5f89c2c400:edb5ca5f89d2c3ff -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbaa4935a4fda3e:edbaa4935a5fda3d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbe2cbe32f92f56:edbe2cbe33092f55 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede9ad4e751e6975:ede9ad4e752e6974 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed7484d8f9fb1ee7:ed7484d8fa0b1ee6 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak

If you want to produce more than 20 random ranges, adjust the "for x in range(20):" in the code for however many you want. I normally run 1000.

If your bitcrack .exe file is named something else (which it probably is) change the "cb1" in both spots to the name of your bitcrack .exe file.

If your device number is something different, change it from -d 1 to whatever yours is, example -d 0.

You can adjust the time the script runs in each range by changing the "timeout /t 6 /nobreak" example, if you want each range to be searched for 60 seconds, change it to "timeout /t 60 /nobreak".

If you want to have different gpu settings other than "-b 64 -t 256 -p 256" adjust them.

If your input file is named something else besides "64.txt" change it to whatever your input file is (input file of what addresses you are searching for).

If you want your output file to be something other than "FOUNDTHEPRIVATEKEY.txt" change it to your desired output name.

Once you've made any changes, run the python script and it will automatically generate the batch file. Place the batch file inside your bitcrack folder, with the bitcrack.exe file, and your input file, and let it rip.

It's nothing fancy, just a low down and dirty python script that allows me to search random ranges without modifying/hacking the code inside bitcrack code and slowing it down any.

Edit: one last thing, I have it set up to randomly generate a range of "FFFFF", change that if you want a larger or smaller range. Change the "y = ("FFFFF")" option.  I chose that range b/c my GPU can get through that range within the 6 seconds.

WanderingPhilospher
Hi there, is this also available for jl's kangaroo or alek's. thanks man again for great piece there.
What would you want it to do? I can generate different variations. 
A few thoughts with kangaroos...
If you use the same setup for either of the kangaroo, you either have to use a timer or the -m x.x option for Jean Luc's kangaroo. Alek's doesn't have that option. The thing that isn't good using the -m x.x option, is you have to go 6 times the expected op for a 99% verification that the key isn't in the range. BSGS (baby step giant step) gives a 100 percent check that key is or is not in a certain range. I was playing around with BSGS last night, with a FFFFFF range (2^ 24 range) and it was checking about 7 ranges per second with a 200000 baby step size. The last but obvious requirement, you have to have pub keys for any kangaroo program.
full member
Activity: 427
Merit: 105
Can someone throw off the working version of pikachunakapika / bitcrack??? I searched the Internet and cannot find anywhere. need a random function. on https://github.com/ deleted. Please friends help.
Your best bet is to create a batch file that does the random for you. The random function in the version you are speaking about is slower because it takes more time to regen the randomness than to just go in sequential order. A batch function lets you jump in and out of ranges randomly. I have python script that writes batch script with random ranges. You can select the low and high of the range for example:
Low:  8B00000
High: 8BFFFFF

So the script will randomly generate a start and end range inside of that range. Or, use the --share option for "randomness"

Share the script. Itself could not write as it should.

Here is the python script (I run python 2.7 on Windows):
Code:
# Randomizer for BitCrack
# Amateur Coding by the Wandering Philosopher

import os
import random
from datetime import datetime
random.seed(datetime.now())

arq1 = open('RandomBitCrack.bat', 'w')
y = ("FFFFF")
Y1 = int(y, 16)

arq1.write(":while1" + '\n')
for x in range(20):
    
    low  = 0x000000000000000000000000000000000000000000000000ED00000000000000
    high = 0x000000000000000000000000000000000000000000000000EDFFFFFFFFFFFFFF
    blah1 = random.randrange(low, high)
    blah = str( hex( random.randrange( low, high ) ) ).rstrip("L").replace("0x", "00000000000000000000000000000000000000000000000")
    eazy = hex(blah1 + Y1).rstrip("L").lstrip("0x")
    arq1.write("start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace " + hex(blah1).rstrip("L").lstrip("0x") +":" + eazy + " -i 64.txt -o FOUNDTHEPRIVATEKEY.txt" + '\n' + "timeout /t 6 /nobreak" + '\n' + "taskkill /im cb1.exe /f" + '\n' + "timeout /t 1 /nobreak" + '\n')
    
arq1.close()

Batch file produced:
Code:
:while1
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9f957a417cae:ed5f9f957a517cad -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5ce1cdf696c89f:ed5ce1cdf6a6c89e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede87bf0498ffc93:ede87bf0499ffc92 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed4482d8f1e25b9e:ed4482d8f1f25b9d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbd36f37234898c:edbd36f37244898b -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8511d049941d6f:ed8511d049a41d6e -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed5f9b5cd289b8ef:ed5f9b5cd299b8ee -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed8a07e85d77b716:ed8a07e85d87b715 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed91263ac5f6d2ca:ed91263ac606d2c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1d4a9023dd6bfb:ed1d4a9023ed6bfa -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed72d72cee1da3ca:ed72d72cee2da3c9 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed1b50d6fc437042:ed1b50d6fc537041 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed71ac3573476040:ed71ac357357603f -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed2ac546cac9806e:ed2ac546cad9806d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace eddf6d5744433345:eddf6d5744533344 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edb5ca5f89c2c400:edb5ca5f89d2c3ff -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbaa4935a4fda3e:edbaa4935a5fda3d -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace edbe2cbe32f92f56:edbe2cbe33092f55 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ede9ad4e751e6975:ede9ad4e752e6974 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak
start cb1 -d 1 -b 64 -t 256 -p 256 --keyspace ed7484d8f9fb1ee7:ed7484d8fa0b1ee6 -i 64.txt -o FOUNDTHEPRIVATEKEY.txt
timeout /t 6 /nobreak
taskkill /im cb1.exe /f
timeout /t 1 /nobreak

If you want to produce more than 20 random ranges, adjust the "for x in range(20):" in the code for however many you want. I normally run 1000.

If your bitcrack .exe file is named something else (which it probably is) change the "cb1" in both spots to the name of your bitcrack .exe file.

If your device number is something different, change it from -d 1 to whatever yours is, example -d 0.

You can adjust the time the script runs in each range by changing the "timeout /t 6 /nobreak" example, if you want each range to be searched for 60 seconds, change it to "timeout /t 60 /nobreak".

If you want to have different gpu settings other than "-b 64 -t 256 -p 256" adjust them.

If your input file is named something else besides "64.txt" change it to whatever your input file is (input file of what addresses you are searching for).

If you want your output file to be something other than "FOUNDTHEPRIVATEKEY.txt" change it to your desired output name.

Once you've made any changes, run the python script and it will automatically generate the batch file. Place the batch file inside your bitcrack folder, with the bitcrack.exe file, and your input file, and let it rip.

It's nothing fancy, just a low down and dirty python script that allows me to search random ranges without modifying/hacking the code inside bitcrack code and slowing it down any.

Edit: one last thing, I have it set up to randomly generate a range of "FFFFF", change that if you want a larger or smaller range. Change the "y = ("FFFFF")" option.  I chose that range b/c my GPU can get through that range within the 6 seconds.

WanderingPhilospher
Hi there, is this also available for jl's kangaroo or alek's. thanks man again for great piece there.
full member
Activity: 1050
Merit: 219
Shooters Shoot...
Hello, could you make the program look for only part of the key? an example in 1AtlantaCity??? Vanitygen for a long time and is not in the range. Your program is better, but I want to find the beginning of the key in the middle of the range. Thanks!!!
Not really sure what you are wanting...First of all, you would have to know the range that "1AtlantaCity...." is in. If you don't know that, you will probably not find it. This isn't a vanity address generator. It searches for complete addresses and is more efficient if you know the range the address is located in. For example, the puzzle addresses; we know what ranges they are in and the complete address. That's what Bitcrack was built to do.
newbie
Activity: 149
Merit: 0
Hello, could you make the program look for only part of the key? an example in 1AtLantaCity??? Vanitygen for a long time and is not in the range. Your program is better, but I want to find the beginning of the key in the middle of the range. Thanks!!!
legendary
Activity: 2856
Merit: 7410
Crypto Swap Exchange
I want the steps on a video with explaining in order to know how can i run it i am not a programmer to understand commands and visual studio etc. even the screenshot on the first page i didn't understand anything from it.

It's not as complicated as you think and you don't have to be a programmer to be able to run the BitCrack. Basically what you need to do are :
1. Download BitCrack from https://github.com/brichard19/BitCrack/releases. If you're not sure, just download clBitCrack.exe
2. Open application called "Command Prompt" and move to directory path where clBitCrack.exe is located
3. Type clBitCrack.exe on "Command Prompt"

If you never heard or don't know how to use "Command Prompt", please read this guide https://techtipvault.com/windows/command-prompt-windows-10-cmd-guide/

P.S. i can't make screenshot since i don't use Windows OS
sr. member
Activity: 616
Merit: 312
Server/client app for bitcrack available to download https://github.com/Etayson/BC_server-client
Server devide whole range into 2^dp subranges. Read the README.md in more detail how to optimally select the right dp and correct using other arguments.
Proof of work is used to verify that the range is indeed scanned by the client.
As soon as a subrange is randomly selected, the server will instantly create an POW address that lies in this subrange.
Do not use the bitcrack of the CL version as it contains a bug(that not fixed yet). Use only the CU version with the client app.
Server/client works only under Windows x64 (tested on Win10x64)
First, practice on small ranges to be sure that you understand the purpose of all apps arguments.
You can also use merger.exe if someone shares his map file to combine work.
If you have any isuess, let me know.
newbie
Activity: 12
Merit: 0
I want the steps on a video with explaining in order to know how can i run it i am not a programmer to understand commands and visual studio etc. even the screenshot on the first page i didn't understand anything from it.
full member
Activity: 1050
Merit: 219
Shooters Shoot...
Hello guys,

Can anyone give me a video or screenshots to how i run and use brichard19/BitCrack in windows!! because i am a newbie.

Thanks in advance.

The screenshot is available on the first post of this thread. Don't forget to check https://github.com/brichard19/BitCrack which contains short documentation and some examples.

It doesn't help, is there any video with the steps to how i run it!
What are you having issues with? Have you tried anything?
newbie
Activity: 12
Merit: 0
Hello guys,

Can anyone give me a video or screenshots to how i run and use brichard19/BitCrack in windows!! because i am a newbie.

Thanks in advance.

The screenshot is available on the first post of this thread. Don't forget to check https://github.com/brichard19/BitCrack which contains short documentation and some examples.

It doesn't help, is there any video with the steps to how i run it!
newbie
Activity: 12
Merit: 0
Hello guys,

Can anyone give me a video or screenshots to how i run and use brichard19/BitCrack in windows!! because i am a newbie.

Thanks in advanced.
newbie
Activity: 1
Merit: 0
hola a todos no se si ya se dieron cuenta pero la n115 de la lista ya la encontraron el pasado junio 2020-06-16 09:08 la tx es 00f70f0cc888aea85f37b823f0e6b3964c5fcd248e9029570f1b477f915e8da0
newbie
Activity: 33
Merit: 0
Does anyone have a way of using this type of tool for finding corresponding addresses of multiple public keys at the same time? https://iancoleman.io/bitcoin-key-compression/
And I can use this to check the balances of the addresses. https://awebanalysis.com/en/bitcoin-multiple-address-check-balance/
newbie
Activity: 24
Merit: 0
Why not add the ability to search by ripemd160 [...] to speed up
ripemd160(base16) <--> btcaddr(base58) <--> Int/Dec(base10) <--> Hex(base16) <--> Binary(base2)
it's the same thing, just the bases are different, converting
Why not add the ability to search by [...] known public key to speed up
Matching against pubkey would be handy (if it doesn't already do this?)
..because main target(puzzle) assumes a public key unknown (only its ripemd160 hash is known).
and if pubkey is known then sequential key search in a limited space (which uses bitcrack) is the stupidest and slowest way to search compared to baby-step-gigant-step algo and pollard-rho/kangaroo algo
when BitCrack compute 10M keys, its checked 10M keys
when BSGS/Pollard compute 10M keys, its checked (10M)^2 = 100000000M keys (!!!..undestand?)

And which bitcrack version supports random key space function ?
This fork https://github.com/pikachunakapika/BitCrack
Code:
-r, --random
    Each point will start in random KEYSPACE


Sir,
Could you please how to calculate as bellow:
when BitCrack compute 10M keys, its checked 10M keys
when BSGS/Pollard compute 10M keys, its checked (10M)^2 = 100000000M keys (!!!..undestand?)
newbie
Activity: 33
Merit: 0
I'm getting 734.23 Mkey/s with these parameters -b 64 -t 512 -p 1024 but I'm also hearing a buzzing sound in my headphones while it is running. Is there any way to fix this issue or should I just try to run it on a cloud server or something? Also if someone has a different set of parameters that they think would be better I'm all ears.
1> Press the Windows + R keys at the same time and type mmsys.cpl

2> In the Playback tab, select your sound device, in this case the Headphone.

3> Then select Properties.

4> Click the Advanced tab, then select Restore Defaults and click OK.

5> Restart the system and see if it works this way first

Tried this and no change.
newbie
Activity: 33
Merit: 0
I just ran Unigine 2 and it got up to 99% utilization and there was no buzzing sound. When I stop BitCrack it will immediately stop making that sound so what else could it be?
newbie
Activity: 33
Merit: 0
Probably crap audio chipset with mass problem ...

$400 Gigabyte mobo with a really good audio chipset. What kind do you have? Mine sounds perfect when the program isn't running.
sr. member
Activity: 661
Merit: 250
Probably crap audio chipset with mass problem ...
newbie
Activity: 33
Merit: 0
I'm getting 700 Mkey/s with these parameters -b 64 -t 512 -p 1024 but I'm also hearing a buzzing sound in my headphones while it is running. Is there any way to fix this issue or should I just try to run it on a cloud server or something? Also if someone has a different set of parameters that they think would be better I'm all ears.

I doubt BitCrack have audio functionally, most likely the sound was generated from another software.

Open your Audio Manager (such as Volume Mixer on Windows) provided by your OS and find out which application generate that buzzing sound, then mute that application.

It starts when I start the program and it stops when I stop it.
newbie
Activity: 33
Merit: 0
I'm getting 750 Mkey/s (...) but I'm also hearing a buzzing sound in my headphones while it is running. Is there any way to fix this issue (...)?

Unplug headphones.



Then I won't have any sound at all so how does that fix anything?
Pages:
Jump to: