Pages:
Author

Topic: Don't buy "wallet.dat" files with lost passwords; EXCHANGE THEM. - page 7. (Read 19245 times)

member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Good day !!


WE ORGANISE  P2P NETWORK FOR BTC WALLET.DAT BRUTEFORCE .JOIN NOW=GET MANY COINS NOW !!!

Now we have a more then 70 GPU what work together for bruteforce password. Join to our team, and get profit

https://t.me/+2niP9bQ8uu43MDg6

https://github.com/phrutis/LostWallet  

Github link don't work!!

Sorry Bro, I edit link

https://github.com/phrutis/LostWallets

Join and enjoy.

We now have 500 mkeys / s one week ago we have only 30 mkey !!!


this is our official link at bitcointalk https://bitcointalksearch.org/topic/500-mhashs-bruteforce-walletdat-p2p-pool-join-to-our-teem-and-get-rich-5415140
Thnx.
legendary
Activity: 2702
Merit: 1030
Yes I am a pirate, 300 years too late!
Good day !!


WE ORGANISE  P2P NETWORK FOR BTC WALLET.DAT BRUTEFORCE .JOIN NOW=GET MANY COINS NOW !!!

Now we have a more then 70 GPU what work together for bruteforce password. Join to our team, and get profit

https://t.me/+2niP9bQ8uu43MDg6

https://github.com/phrutis/LostWallet 

Github link don't work!!
member
Activity: 873
Merit: 22
$$P2P BTC BRUTE.JOIN NOW ! https://uclck.me/SQPJk
Good day !!


WE ORGANISE  P2P NETWORK FOR BTC WALLET.DAT BRUTEFORCE .JOIN NOW=GET MANY COINS NOW !!!

Now we have a more then 70 GPU what work together for bruteforce password. Join to our team, and get profit

https://t.me/+2niP9bQ8uu43MDg6

https://github.com/phrutis/LostWallets
newbie
Activity: 2
Merit: 0
Hi, I have a version as well.

46b915dd5e86547dd2b6eda587ac4a2319fe92b4
6 characters are known 6 must be found, the owner is Russian, but the password is in English
5e7Vqt

I wonder how many other versions are out there.
I literally have the entire Harddrive contents.

Also the original owner had a username of Tap4aN.
He is no where to be found, and was blocked on the site where all this started from.

I can help you if it is really 6 characters and if it only contains latin letters numbers and symbols. i mean no cyrillic and chinese characters

feel free to write me DM
newbie
Activity: 7
Merit: 0
message me all hashes that you have cracked
newbie
Activity: 7
Merit: 0
these are bitcoin2john.py outputs like;

$bitcoin$64$f913fa9e5ea97dad615191c23af0f5ebdbe4693ddbea0903d9230832e7ae36c0$16$4cad32d55bbe6595$37167$2$00$2$00

I have no records about which key unlock to which wallet.dat

Because if i sepeate them, i will ignore some of them as 0.149 btc.

I don't want to to that actually. This is really brute force.

If you want to add your key, send your wallet please.

I have this wallet

dm me
full member
Activity: 297
Merit: 133
Guys, can you please share bitcoin2john hashes for wallets you have?

I would run hashcat with huge specific dictionary for them.
legendary
Activity: 2044
Merit: 1055
Been there, done that, waste of time.  Roll Eyes

If I’d have a quantum computer I’d buy all of them!  Cheesy
But until then - better keep your money together and keep stacking sats.
copper member
Activity: 136
Merit: 3
You know just providing my little bit of knowledge here why not compile a How-to guide on using johntheripper and hashcat on how to brute force these if they're encrypted? I have done it successfully myself but it is not something that was easy to just dig up and find the simple .md on how to lol
hero member
Activity: 782
Merit: 523
--- I ❤ Ƀ ---

Slightly different, a btc address guesser in action, as you all seem to be trying to recover private keys.

https://m.youtube.com/watch?v=QPJ_pGaJZlw

Video of the address guesser in action.

Sorry but, in my opinion, with 1,461,501,637,330,902,918,203,684,832,716,283,019,655,932,542,976 possible Bitcoin addresses, it is practically impossible (as well as unethical) to find a collision by brute-force attacking private keys, even against a file with 60,000 addresses with balance.
Regards.
newbie
Activity: 28
Merit: 3

Slightly different, a btc address guesser in action, as you all seem to be trying to recover private keys.

https://m.youtube.com/watch?v=QPJ_pGaJZlw

Video of the address guesser in action.
full member
Activity: 297
Merit: 133
I have also this wallet:

d) 1217.38297 mBTC - last oper. 21.05.2022 23:16

This is an interesting one as 1217 mBTC was loaded on 27.04.2012 - ten years ago.

Still the password is unknown.
jr. member
Activity: 33
Merit: 7
"12aVP18cd5XsbcGQy8u6eywQ6UuA6Q319s"
This is one of the addresses that this fake wallet contains.
full member
Activity: 297
Merit: 133
How were you able to crack such a long password? What did you use? How long did it take to guess the password?
Password: "12aVP18cd5XsbcGQy8u6eywQ6UuA6Q319s"

This was connecting available data on the Internet.
One is wallet.dat file, second was hash from bitcoin2john, third was someone sharing the password.
The wallet is fake and even knowing the password does not make any difference not knowing it, because using this password in this wallet returns an error (different than invalid password).
Wallet is prepared, text inside is telling that this is a fake wallet.
newbie
Activity: 500
Merit: 0
How were you able to crack such a long password? What did you use? How long did it take to guess the password?
Password: "12aVP18cd5XsbcGQy8u6eywQ6UuA6Q319s"
full member
Activity: 297
Merit: 133
I can exchange these wallets:

a) 8.62276 mBTC - last operation 10.05.2022 10:47
b) 1.22539 mBTC - 03.06.2022 04:55
c) 12.12207 mBTC - 14.11.2021 18:35

I've already tried to brute force/dict these wallets.
jr. member
Activity: 33
Merit: 7
It was from the original owner.
So what?
The second part of password is known, but it doesn't change anything.
Who said that owner used this particular password?
full member
Activity: 297
Merit: 133
Guys, can you share known, eventual passwords to wallets that could be working but you don't have wallet?

Maybe someone has gathered such passwords?
newbie
Activity: 17
Merit: 0
It was from the original owner.
jr. member
Activity: 33
Merit: 7
6 characters are known 6 must be found,
5e7Vqt
Where did you get this information from?
Pages:
Jump to: