Author

Topic: Getting a hash from a mobile backup with JtR? (Read 131 times)

legendary
Activity: 2240
Merit: 3150
₿uy / $ell ..oeleo ;(
January 06, 2021, 08:42:09 AM
#2
I'm not that of an expert but you have to open the backup file with text editor and check the initial symbols, they are the salted info you can use to find out what type of encryption was used on the file.
I guess the file starts with U2FsdGVkX1 and it is openssl type. I saw some YouTube videos about bitcoin wallets exacting the private keys some time ago and they were using opnessl for that. John has the openssl2john.py and voila.

I think I'm wrong here. There is no password hash stored in the file. SOrry for missleading you...

EDIT and UPDATE: btcrecover can do that.. I'll write a guide how to do it.
jr. member
Activity: 46
Merit: 66
#WeAreAllHodlonaut
If I have the backup of the keys from an android bitcoin wallet. How can I get the hash of the backup file (the name is like bitcoin-wallet-keys-XXXX-XX-XX)  with John the ripper?
I have a Dash backup and I think the above procedure will work on the dash wallet too as they are similar, right?

I can make a new backup with password 123 and test all the possible hash variations created with john the ripper and test which one will be correct but I decided to ask first here.
The Internet is silent about this. 

 
Jump to: