Pages:
Author

Topic: Found old paper with password hints... btcrecover help w/ python errors - page 2. (Read 580 times)

legendary
Activity: 952
Merit: 1386
If the problem is to find wallet.dat password, I think hashcat is a much better solution.
I think it is easier to configure search parameters (at least for me)...
https://hashcat.net/hashcat/

You would simply prepare a configuration using masks:
https://hashcat.net/wiki/doku.php?id=mask_attack



newbie
Activity: 23
Merit: 12
-snip- I am wondering how to enable GPU?
Add --enable-gpu argument to your command.
That's assuming that you've successfully installed pyopencl and your GPU is supported.


b2352351, could you paste here the command you launch? In which mode you use btcrecover? Maybe in the one where GPU is not supported (or gives very limited performance improvement).
What is "password"? Is it for a seed or brainwallet?

Code:
python btcrecover.py --wallet wallet.dat --tokenlist tokenlist.txt

But now I am going to add

Code:
python btcrecover.py --enable-gpu --wallet wallet.dat --tokenlist tokenlist.txt

and expand my password/token list.

Also I'm pretty sure my wallet.dat file is intact. It still says modified in 2013 in the properties and opens fine inside of the latest version of bitcoin core. Has there ever been any cases of wallet.dat files saying wrong password after being copied from the original machine? Or would you get a file corruption error within bitcoin core long before that? I really thought I'd be able to get it on the first pass. Now I just gotta sit down and expand the tokenlist a little bit.
legendary
Activity: 952
Merit: 1386
-snip- I am wondering how to enable GPU?
Add --enable-gpu argument to your command.
That's assuming that you've successfully installed pyopencl and your GPU is supported.


b2352351, could you paste here the command you launch? In which mode you use btcrecover? Maybe in the one where GPU is not supported (or gives very limited performance improvement).
What is "password"? Is it for a seed or brainwallet?
legendary
Activity: 2268
Merit: 18771
Also on the bottom of the password  list I added some old random passwords I had saved. I added 4 and it changed it to over 200,000 guesses now. How is that working?
As I explained above, the tokens file will take a maximum of one entry from each line and combine them in all allowed permutations. So by including four passwords at the end like that, it will now be combining those passwords in every possible permutation with all the entries from the first three lines. If you want to simply try the four old passwords, then use the command --passwordlist instead of --tokenlist. That will just try each line of your file verbatim without combining it with other lines.
legendary
Activity: 2618
Merit: 6452
Self-proclaimed Genius
-snip- I am wondering how to enable GPU?
Add --enable-gpu argument to your command.
That's assuming that you've successfully installed pyopencl and your GPU is supported.

note: You can check all available commands by entering: python btcrecover.py -h
newbie
Activity: 23
Merit: 12
I got it cracking the tokenlist.txt file.. My first pass was unsuccessful. Said about 3,000 attempts. It is only using the CPU though. I am wondering how to enable GPU?

Also on the bottom of the password  list I added some old random passwords I had saved. I added 4 and it changed it to over 200,000 guesses now. How is that working?

^1^3characters ^1^3characters^1^3characters^1^3characters^1^3characters^1^3characters
^2^4characters ^2^4characters ^2^4characters ^2^4characters ^2^4characters ^2^4characters
^3^3characters ^3^3characters ^3^3characters ^3^3characters ^3^3characters ^3^3characters
oldpassword1
oldpassword2
oldpassword3
oldpassword4
newbie
Activity: 23
Merit: 12
If you think you can manage that then no harm in trying. It is difficult to understand exactly what you are saying when you say you are redacting some information - whether the "Z" represents any uppercase letter or one specific uppercase letter, for example.

Here is a much more narrow token file based on some assumptions about what you have said above:

Code:
^1^Abc ^1^abc ^1^EFG ^1^Hij ^1^hij
^2^%[1Z]:23 ^2^%[1Z]:33 ^2^%[1Z]:@# ^2^%[1Z]:## ^2^Z339
^3^Abc ^3^abc ^3^EFG ^3^Hij ^3^hij ^3^Z33 ^3^Z##

This will only generate 365 passwords.

A little confused on the structures and how tokenlist works
It will try one token from each line. The ^1^ before each entry simply tells it to try that token in the first position, ^2^ in the second position, and ^3^ in the third position. So essentially the file above will taken one token from each line in the order the lines are presented.

You can run btcrecover with the argument --listpass and it will simply print all the passwords in your terminal window so you can see what it is generating to make sure it is doing what you think it should be.

Ok let me dig into that a little more now. I am kind of dumb so it still looking a little daunting to me. But I will try to work through it slowly. Now, how do I go about deploying the crack command? Which token list in which directory do I update? Oh and I'm not sure how to load the wallet.dat... Thanks again for all the help!
legendary
Activity: 2268
Merit: 18771
If you think you can manage that then no harm in trying. It is difficult to understand exactly what you are saying when you say you are redacting some information - whether the "Z" represents any uppercase letter or one specific uppercase letter, for example.

Here is a much more narrow token file based on some assumptions about what you have said above:

Code:
^1^Abc ^1^abc ^1^EFG ^1^Hij ^1^hij
^2^%[1Z]:23 ^2^%[1Z]:33 ^2^%[1Z]:@# ^2^%[1Z]:## ^2^Z339
^3^Abc ^3^abc ^3^EFG ^3^Hij ^3^hij ^3^Z33 ^3^Z##

This will only generate 365 passwords.

A little confused on the structures and how tokenlist works
It will try one token from each line. The ^1^ before each entry simply tells it to try that token in the first position, ^2^ in the second position, and ^3^ in the third position. So essentially the file above will taken one token from each line in the order the lines are presented.

You can run btcrecover with the argument --listpass and it will simply print all the passwords in your terminal window so you can see what it is generating to make sure it is doing what you think it should be.
newbie
Activity: 23
Merit: 12
Ok, so based on all of that, your token file will look like this:

Code:
^1^%3A ^1^%3a ^1^%A%2a
^2^%in%y23 ^2^%in%y33 ^2^%in%y@# ^2^%in%y## ^2^%ia33%d
^3^%3A ^3^%3a ^3^%A%2a ^3^%A33 ^3^%A##

You can find the instructions on how I constructed this here: https://btcrecover.readthedocs.io/en/latest/tokenlist_file/



So for the first part it will try the following, where A/a represents any letter (case sensitive):
Code:
AAA
aaa
Aaa

For the second part it will try the following:
Code:
Any single digit, lowercase, or uppercase letter, followed by
Any single symbol, followed by
23, 33, @#, or ##

OR

Any single lowercase or uppercase letter, followed by 33, followed by any single digit

For the third part it will try the same as the first part, but also any uppercase letter followed by 33 or ##.



However, before you try to run this, you will need to try to narrow it down a bit. If you can replace any of the wildcards with something more specific (e.g. instead of "Any single digit, lowercase, or uppercase letter" at the start of the second part with "Definitely either a 1 or an uppercase Z"), then it would reduce the search space a lot. As it stands, that tokensfile will generate 23.5 trillion possible passwords, which on the provided benchmark for a 1660 of 6750 passwords/second, would take ~110 years to check.

A little confused on the structures and how tokenlist works with btcrecover but another cracker I read about uses multiple word lists and tries all possible combinations. Something like that makes a little more sense to me. I can start with 3 word lists and put all possible 3 character sequence in the first word list, 4 character sequence in the 2nd word list, and last 3 character sequence in the 3rd word list and start from there.

Anyway to format the tokenlist like into 3 seperate documents but on the same tokenlist? I could work from there and input my stuff.
legendary
Activity: 2268
Merit: 18771
Ok, so based on all of that, your token file will look like this:

Code:
^1^%3A ^1^%3a ^1^%A%2a
^2^%in%y23 ^2^%in%y33 ^2^%in%y@# ^2^%in%y## ^2^%ia33%d
^3^%3A ^3^%3a ^3^%A%2a ^3^%A33 ^3^%A##

You can find the instructions on how I constructed this here: https://btcrecover.readthedocs.io/en/latest/tokenlist_file/



So for the first part it will try the following, where A/a represents any letter (case sensitive):
Code:
AAA
aaa
Aaa

For the second part it will try the following:
Code:
Any single digit, lowercase, or uppercase letter, followed by
Any single symbol, followed by
23, 33, @#, or ##

OR

Any single lowercase or uppercase letter, followed by 33, followed by any single digit

For the third part it will try the same as the first part, but also any uppercase letter followed by 33 or ##.



However, before you try to run this, you will need to try to narrow it down a bit. If you can replace any of the wildcards with something more specific (e.g. instead of "Any single digit, lowercase, or uppercase letter" at the start of the second part with "Definitely either a 1 or an uppercase Z"), then it would reduce the search space a lot. As it stands, that tokensfile will generate 23.5 trillion possible passwords, which on the provided benchmark for a 1660 of 6750 passwords/second, would take ~110 years to check.
newbie
Activity: 23
Merit: 12
Ok, that's helpful. However, the additional uncertainty will greatly increase the search space.

So the first part we are now saying is 3 letters, which could either be all uppercase, all lowercase, or one uppercase followed by two lowercase.

The second part becomes tricky:
Next 4 characters of the password are either 1:23, 1:33 or Z:33 or Z33... There could also be the shift/caps key applied to this part of the sequence..
So definitely 4 characters? Or it might only be 3? The first character could be a number or a letter (either case)? This might be followed by a symbol, but might not be? Then any two numbers or symbols? Or is it specifically one of the following:
Code:
23
33
@#
##

Or perhaps your keyboard doesn't have the @ and # symbols above 2 and 3?

Then the last three characters could be 3 letters (all uppercase, all lowercase, or one uppercase followed by two lowercase) OR an uppercase letter followed by 2 numbers or 2 symbols? Again, is this definitely 33 or ##, or could it be any two numbers or symbols?

First part, The last part could also be Abc abc or EFG as in the first cap of each word hint. It could also be Hij or hij lower case which is another hint for the first part of the password..

Second part, the middle sequence is definitely 4 characters such as 1:23, 1:22, Z:23 or Z:33 the Z represents a notation I did to suggest a different character but I am redacting that part. It is deff either 23, 33, @# or ## Also another possibility for this part could be Z339. Where as the 339 part starts the : is replaced by the 3. 9 also represents another number I am redacting..

Sorry, I don't mean to make this more complicated that it has to be...

Third part, the last 3 could have a few options. Z33 or Z## where Z represents another letter I am redacting.

Hopefully this clears some things up, trying my best to not forget certain aspects of the puzzle but it turns out to be somewhat complex lol.

Not sure how tokenlist works with btcrecover but another cracker I read about uses multiple word lists and tries all possible combinations. Something like that makes a little more sense to me. I can start with 3 word lists and put all possible 3 character sequence in the first word list, 4 character sequence in the 2nd word list, and last 3 character sequence in the 3rd word list and start from there.
legendary
Activity: 2268
Merit: 18771
Ok, that's helpful. However, the additional uncertainty will greatly increase the search space.

So the first part we are now saying is 3 letters, which could either be all uppercase, all lowercase, or one uppercase followed by two lowercase.

The second part becomes tricky:
Next 4 characters of the password are either 1:23, 1:33 or Z:33 or Z33... There could also be the shift/caps key applied to this part of the sequence..
So definitely 4 characters? Or it might only be 3? The first character could be a number or a letter (either case)? This might be followed by a symbol, but might not be? Then any two numbers or symbols? Or is it specifically one of the following:
Code:
23
33
@#
##

Or perhaps your keyboard doesn't have the @ and # symbols above 2 and 3?

Then the last three characters could be 3 letters (all uppercase, all lowercase, or one uppercase followed by two lowercase) OR an uppercase letter followed by 2 numbers or 2 symbols? Again, is this definitely 33 or ##, or could it be any two numbers or symbols?
newbie
Activity: 23
Merit: 12
Good job getting it working. We can help you make the tokenlist, but you are going to have to be much more specific. From what you've said it still isn't clear what format your password might take.

3 letters, followed by 4 characters and 3 letters or numbers.. a little complicated I know.
In your first post you said 4-3-4. Now you are saying 3-4-3. You'll need to decide which it is.

Picking out the important points from the post you just made:

Quote
xxx 1:23 xxx
It's either the first capitalized letters in a word sequence I wrote down... Or on the new piece of paper it's 3 letters either Abc or abc
followed by the 1:23 middle part
then followed by D11
But this : could represented by another special character

From this, I deduce your password looks like this:

3 letters, the first of which may or may not be capitalized
1 number
1 special character
2 numbers
1 uppercase letter
2 numbers

Please correct me if this is wrong. Further, are there spaces in your password, or have you just put them in your post for formatting/clarity purposes?

There shouldn't be any spaces. I was just using a space to separate the sequences as an example..

Its actual 3-4-3 not 4-3-4. My bad.

first three letters of passwords should be 3 letters. either Abc, abc or the first three capitals of each word in the word sequence such as EFG. This could also correlate to the xxx on the last part of the password.

Next 4 characters of the password are either 1:23, 1:33 or Z:33 or Z33... There could also be the shift/caps key applied to this part of the sequence..

Last 3 characters of the password could be Abc, abc, EFG or D33.. Also the 33 in the D33 could be while holding the shift key ex - D##

I know its kind of complicated and it makes it a little more complicated that I have to change the letters and numbers around all while attempting to keep the same format. Some parts of my password such as the 23, 33 and : are original components though.

If you could maybe give me some formatting tips for the tokenlist then I could work more in depth on modifying that to my password rules.

I am more focused now on trying to deploy the crack command after passing opencl tests and getting pytools installed correctly.
legendary
Activity: 2268
Merit: 18771
Good job getting it working. We can help you make the tokenlist, but you are going to have to be much more specific. From what you've said it still isn't clear what format your password might take.

3 letters, followed by 4 characters and 3 letters or numbers.. a little complicated I know.
In your first post you said 4-3-4. Now you are saying 3-4-3. You'll need to decide which it is.

Picking out the important points from the post you just made:

Quote
xxx 1:23 xxx
It's either the first capitalized letters in a word sequence I wrote down... Or on the new piece of paper it's 3 letters either Abc or abc
followed by the 1:23 middle part
then followed by D11
But this : could represented by another special character

From this, I deduce your password looks like this:

3 letters, the first of which may or may not be capitalized
1 number
1 special character
2 numbers
1 uppercase letter
2 numbers

Please correct me if this is wrong. Further, are there spaces in your password, or have you just put them in your post for formatting/clarity purposes?
newbie
Activity: 23
Merit: 12
Forget about GPU for now, focus on correct configuration.
We may help you build the token file, but you should tell clearly what do you know / what do you suspect.
Do you know address for which you want to find private key?
How the private key is build - is it kind of "brain wallet"? Or what you have is a password for custodial service/exchange?
How the text is composed? From your first post I understand it could be:
Code:
Uppercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
1234567890 or symbols : !#$%&^*? etc...
1234567890 or symbols : !#$%&^*? etc...
1234567890 or symbols : !#$%&^*? etc...
Uppercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter

Right?
just 11 characters or something extra in the middle, like dash (-) between sections?




UPDATE:

Quote
I restarted the machine and reinstalled pip3 install pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl AND pip3 install -r requirements.txt


Now running python run-all-tests.py -vvand it looks like it passed the test_blockchain_second_OpenCL_Brute test notating green text!

I'm onto something boys! Now I just don't know how to configure tokenlist and get that running...

But on the tokenlist subject. Yes I do need help with that and deploying those commands

The password hints I have are as follows:

3 letters, followed by 4 characters and 3 letters or numbers.. a little complicated I know.

for example

xxx 1:23 xxx

I believe I found another piece of paper that has even more hints, or its just the correct piece of paper and the other had decoy hints(such as the first letter of certain words were capitalized in a sequence of words, this could be relevant or irrelevant but I will program this in once i figure out how to make the token list and deploy that command.

In the end I believe both pieces of paper do have relevant parts of the puzzle(caps or holding shift on the middle sequence of characters etc in addition to the other sequences of 10 characters).

This second piece of paper also has a 10 digit sequence of numbers and letters. 10 digits I believe was the minimum length for bitcoin core at the time. This 10 digit sequence also is somewhat related to the other piece of paper because one character is notated in such a way that it possibly relates to a certain character in the xxx 1:23 xxx 10 digit sequence on the first piece of paper Grin

Also, there is 2 digits that really say 23 in the first part of the puzzle and then on the second piece of the paper if you line up the two codes on top of each other it changes to 33... then repeats at the end... 33 which makes me think I have to correct this part of the password.


I have a few things I believe could be the "xxx" or 1:23 part of the password

It's either the first capitalized letters in a word sequence I wrote down... Or on the new piece of paper it's 3 letters either Abc or abc followed by the 1:23 middle part (this part may be all caps or partial caps). then followed by D11.


I have redacted actual characters and numbers from these hints. but the numbers are where numbers should be and letters where letters should be in appropriate Capitals in each place. in the middle of 1:23 the : is actually what is encoded in my password though. But this : could represented by another special character noted in such a way on the first piece of paper.

To make things a little more complicated I was messing around with some basic encryption algorithms at the time. So a second attempt could possible be made by adding +1 +2 +3 to some of the number/letter sequences. So +1 would turn 1 into 2 and +2 would turn 2 into 4 and +3 would turn 3 into 6.
legendary
Activity: 952
Merit: 1386
Forget about GPU for now, focus on correct configuration.
We may help you build the token file, but you should tell clearly what do you know / what do you suspect.
Do you know address for which you want to find private key?
How the private key is build - is it kind of "brain wallet"? Or what you have is a password for custodial service/exchange?
How the text is composed? From your first post I understand it could be:
Code:
Uppercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
1234567890 or symbols : !#$%&^*? etc...
1234567890 or symbols : !#$%&^*? etc...
1234567890 or symbols : !#$%&^*? etc...
Uppercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter
Uppercase or lowercase letter

Right?
just 11 characters or something extra in the middle, like dash (-) between sections?


newbie
Activity: 23
Merit: 12
UPDATE:

Read somewhere that the legacy pytools error installing was due to antivirus.. I disabled antivirus and pytools seems to be installed correctly now!

Code:
  note: This error originates from a subprocess, and is likely not a problem with pip.
error: legacy-install-failure

× Encountered error while trying to install package.
╰─> pytools

note: This is an issue with the package mentioned above, not pip.
hint: See above for output from the failure.

C:\Users\REDACTED\Documents\btcrecover-master (2)\btcrecover-master>pip3 install pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl
Processing c:\users\REDACTED\documents\btcrecover-master (2)\btcrecover-master\pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl
Collecting pytools>=2021.2.7
  Using cached pytools-2022.1.4.tar.gz (68 kB)
  Preparing metadata (setup.py) ... done
Requirement already satisfied: numpy in c:\users\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pyopencl==2021.2.9+cl12) (1.22.3)
Requirement already satisfied: appdirs>=1.4.0 in c:\users\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pyopencl==2021.2.9+cl12) (1.4.4)
Requirement already satisfied: platformdirs>=2.2.0 in c:\users\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pytools>=2021.2.7->pyopencl==2021.2.9+cl12) (2.5.1)
Requirement already satisfied: typing_extensions in c:\users\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pytools>=2021.2.7->pyopencl==2021.2.9+cl12) (4.2.0)
Using legacy 'setup.py install' for pytools, since package 'wheel' is not installed.
Installing collected packages: pytools, pyopencl
  Running setup.py install for pytools ... done
Successfully installed pyopencl-2021.2.9+cl12 pytools-2022.1.4

Time to test the rest...

EDIT:

It looks like its doing something with opencl.. It's stuck on the   test_blockchain_second_OpenCL_Brute Test..

EDIT:

I restarted the machine and reinstalled pip3 install pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl AND pip3 install -r requirements.txt


Now running python run-all-tests.py -vvand it looks like it passed the test_blockchain_second_OpenCL_Brute test notating green text!

I'm onto something boys! Now I just don't know how to configure tokenlist and get that running...
newbie
Activity: 23
Merit: 12
It looks like you just haven't been successful in installing the necessary dependencies. You are right that you don't need coincurve or ecdsa libraries for recovering a Bitcoin Core wallet. Then OpenCL libraries aren't installed by default when you install btcrecover, and you need to install them separately. What did you do to try to install them? Are you sure you have installed the right versions for your version of Python?

I'm not really familiar with Windows,* but this section of the documentation should talk you through getting it installed: https://btcrecover.readthedocs.io/en/latest/GPU_Acceleration/#pyopencl-installation-for-windows

*Do you have a Linux machine you can run this on instead? In my experience it generally works far more smoothly.

I could spin up a linux VM or run it on my main PC but if its possible on windows i'd like to avoid all that Cheesy

I have had a few errors throught the proccess... This is what happens why trying to install the OpenCL libraries.. I might have forgot to include this in original post..

Code:
C:\REDACTED\REDACTED\Documents\btcrecover-master (2)\btcrecover-master>pip3 install[b] pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl[/b]
Processing c:\REDACTED\REDACTED\documents\btcrecover-master (2)\btcrecover-master\pyopencl-2021.2.9+cl12-cp310-cp310-win_amd64.whl
Requirement already satisfied: appdirs>=1.4.0 in c:\REDACTED\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pyopencl==2021.2.9+cl12) (1.4.4)
Collecting pytools>=2021.2.7
  Using cached pytools-2022.1.4.tar.gz (68 kB)
  Preparing metadata (setup.py) ... done
Requirement already satisfied: numpy in c:\REDACTED\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pyopencl==2021.2.9+cl12) (1.22.3)
Requirement already satisfied: platformdirs>=2.2.0 in c:\REDACTED\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pytools>=2021.2.7->pyopencl==2021.2.9+cl12) (2.5.1)
Requirement already satisfied: typing_extensions in c:\REDACTED\REDACTED\appdata\local\programs\python\python310\lib\site-packages (from pytools>=2021.2.7->pyopencl==2021.2.9+cl12) (4.2.0)
[b]Using legacy 'setup.py install' for pytools, since package 'wheel' is not installed.[/b]
Installing collected packages: pytools, pyopencl
  [b]Running setup.py install for pytools ... error
  error: subprocess-exited-with-error[/b]

  × Running setup.py install for pytools did not run successfully.
  │ exit code: 33947949
  ╰─> [28 lines of output]
      running install
      running build
      running build_py
      creating build
      creating build\lib
      creating build\lib\pytools
      copying pytools\batchjob.py -> build\lib\pytools
      copying pytools\codegen.py -> build\lib\pytools
      copying pytools\convergence.py -> build\lib\pytools
      copying pytools\datatable.py -> build\lib\pytools
      copying pytools\debug.py -> build\lib\pytools
      copying pytools\graph.py -> build\lib\pytools
      copying pytools\lex.py -> build\lib\pytools
      copying pytools\log.py -> build\lib\pytools
      copying pytools\mpi.py -> build\lib\pytools
      copying pytools\mpiwrap.py -> build\lib\pytools
      copying pytools\obj_array.py -> build\lib\pytools
      copying pytools\persistent_dict.py -> build\lib\pytools
      copying pytools\prefork.py -> build\lib\pytools
      copying pytools\py_codegen.py -> build\lib\pytools
      copying pytools\spatial_btree.py -> build\lib\pytools
      copying pytools\stopwatch.py -> build\lib\pytools
      copying pytools\tag.py -> build\lib\pytools
      copying pytools\version.py -> build\lib\pytools
      copying pytools\__init__.py -> build\lib\pytools
      copying pytools\py.typed -> build\lib\pytools
      running install_lib
      running install_egg_info
      [end of output]

[b]  note: This error originates from a subprocess, and is likely not a problem with pip.
error: legacy-install-failure[/b]
[b]
× Encountered error while trying to install package.
╰─> pytools
[/b]
note: This is an issue with the package mentioned above, not pip.
hint: See above for output from the failure.

Few question,
1. Is it right to assume you've followed these installation guide (https://btcrecover.readthedocs.io/en/latest/INSTALL/ and https://btcrecover.readthedocs.io/en/latest/GPU_Acceleration/)? Did you install PyOpenCL which match your computer environment?

Yes but see above for the error I forgot to include while installing OpenCL


2. What GPU do you use?

Nvidia 1660


Are you able to configure btcrecover to decrypt the data you have? I would first focus on proper configuration for your problem (to create a token file etc), not on GPU.
First try to launch in on CPU, maybe the performance will be good enough.


It seems like I am missing a complete understanding of the usage commands of btcrecover. I saw one example but didn't really understand it and how to apply it to my instance.

I did try this test though and go the following errors:

Code:
C:\REDACTED\REDACTED\Documents\btcrecover-master (2)\btcrecover-master>python3 -m btcrecover.test.test_passwords -v GPUTests
Traceback (most recent call last):
  File "C:\Program Files\WindowsApps\PythonSoftwareFoundation.Python.3.10_3.10.1264.0_x64__qbz5n2kfra8p0\lib\runpy.py", line 187, in _run_module_as_main
    mod_name, mod_spec, code = _get_module_details(mod_name, _Error)
  File "C:\Program Files\WindowsApps\PythonSoftwareFoundation.Python.3.10_3.10.1264.0_x64__qbz5n2kfra8p0\lib\runpy.py", line 110, in _get_module_details
    __import__(pkg_name)
  File "C:\REDACTED\REDACTED\Documents\btcrecover-master (2)\btcrecover-master\btcrecover\__init__.py", line 2, in
    from .btcrpass import *
  File "C:\REDACTED\REDACTED\Documents\btcrecover-master (2)\btcrecover-master\btcrecover\btcrpass.py", line 47, in
    from Crypto.Cipher import AES
ModuleNotFoundError: No module named 'Crypto'

How would I go about launching a crack attempt with cpu? I dont exactly have a world list of thousands.. It will probably be 3 to 8 world lists with a couple dozen words in each. Not sure how many cracks that would take.
legendary
Activity: 952
Merit: 1386
btcrecover in gpu mode works on Windows 10 without any problems, just follow the instruction how to install additional dependencies.
But let's move that aside. Are you sure you know how to read/understand the information you have?
Are you able to configure btcrecover to decrypt the data you have? I would first focus on proper configuration for your problem (to create a token file etc), not on GPU.
First try to launch in on CPU, maybe the performance will be good enough.
legendary
Activity: 2870
Merit: 7490
Crypto Swap Exchange
Few question,
1. Is it right to assume you've followed these installation guide (https://btcrecover.readthedocs.io/en/latest/INSTALL/ and https://btcrecover.readthedocs.io/en/latest/GPU_Acceleration/)? Did you install PyOpenCL which match your computer environment?
2. What GPU do you use?
Pages:
Jump to: