It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
#!/usr/bin/ruby -w
class Cracker
def initialize(char_array, password_range)
@char_array = char_array
@password_range = password_range
end
def password_correct?(phrase)
print "basepassword" + phrase, "\t"
system("./bitcoind walletpassphrase basepassword#{phrase} 20")
case $?.exitstatus
when 0
puts "Found it! basepassword#{phrase}"
exit 0
end
return false
end
def generate_password( perm_number, password_length )
password=""
(1..password_length).each do |char_number| # loop through characters
char_reference = (perm_number / @char_array.length**(char_number-1)).floor % @char_array.length
character = @char_array[char_reference]
password << character
end
password
end
def do_combination( num_combinations, password_length )
(0..num_combinations-1).each do |perm_number| # loop through combinations for a given length
password = generate_password( perm_number, password_length )
return password, perm_number if password_correct?(password)
end
end
def crack()
(@password_range).each do |password_length| # loop to gradually increase password length
num_combinations=@char_array.length**password_length
password, perm_number = do_combination(num_combinations, password_length)
if password
puts "#{password} | Access Granted | #{perm_number} / #{num_combinations}"
return password
end
end
end
end
# I removed characters I was sure I didn't use
characters = "!$@01235@ABCDEFGIKLMNOSTWYZabcdefgiklmnopqrstuwyz".split(//)
cracker = Cracker.new( characters, (6..8) )
password = cracker.crack()
puts "No luck."
exit 1
Wallet | Software | Language | KDF | Hash | AES-256 | ECDSA? | Iterations | Memory | GPUs | P/s | ||
Armory | BTCR | Python 2.7 | ROMix | C++ | SHA-512 | C++ | C++ | Yes | 4 | 2 MiB | 20 | |
Armory | BTCR | Python 2.7 | ROMix | OpenCL (GPU) | SHA-512 | OpenCL (GPU) | C++ | Yes | 4 | 2 MiB | 1 | 79 |
Armory | BTCR | Python 2.7 | ROMix | OpenCL (GPU) | SHA-512 | OpenCL (GPU) | C++ | Yes | 4 | 2 MiB | 2 | 128 |
Bitcoin Core | BTCR | Python 2.7 | PBKDF1 | Python | SHA-512 | C | C | No | 67,908 | 44 | ||
Bitcoin Core | JtR | C w/OpenMP | PBKDF1 | C | SHA-512 | asm | asm w/AES-NI | No | 67,908 | 121 | ||
Bitcoin Core | BTCR | Python 2.7 | PBKDF1 | OpenCL (GPU) | SHA-512 | OpenCL (GPU) | C | No | 67,908 | 1 | 1,070 | |
Bitcoin Core | BTCR | Python 2.7 | PBKDF1 | OpenCL (GPU) | SHA-512 | OpenCL (GPU) | C | No | 67,908 | 2 | 2,110 | |
Blockchain.info | BTCR | Python 2.7 | PBKDF2 | Python | SHA-1 | C | C | No | 10 | 27,000 | ||
Blockchain.info | BTCR | Python 2.7 | PBKDF2 | C | SHA-1 | C | C | No | 10 | 82,000 | ||
Blockchain.info | JtR | C w/OpenMP | PBKDF2 | C | SHA-1 | C w/SSE4.1 | asm w/AES-NI | No | 10 | 533,000 | ||
Blockchain.info | JtR | C w/OpenMP | PBKDF2 | OpenCL (GPU) | SHA-1 | OpenCL (GPU) | asm w/AES-NI | No | 10 | 1 | 3,996,000 | |
Blockchain.info | BTCR | Python 2.7 | PBKDF2 | Python | SHA-1 | C | C | No | 10,000 | 41 | ||
Blockchain.info | BTCR | Python 2.7 | PBKDF2 | C | SHA-1 | C | C | No | 10,000 | 262 | ||
Electrum | BTCR | Python 2.7 | PBKDF1 | Python | SHA-256 | C | Python | No | 2 | 25,000 | ||
Electrum | BTCR | Python 2.7 | PBKDF1 | Python | SHA-256 | C | C | No | 2 | 396,000 | ||
MultiBit | BTCR | Python 2.7 | custom | Python | MD5 | C | Python | No | 3 | 26,000 | ||
MultiBit | BTCR | Python 2.7 | custom | Python | MD5 | C | C | No | 3 | 415,000 |
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
116668178 of 642544812 [#####--------------------------] 0:06:26, ETA: 0:29:01
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
116668178 of 642544812 [#####--------------------------] 0:06:26, ETA: 0:29:01
Password found: 'Passwd'
Press Enter to exit ...
Read additional options from tokenlist file: --pause --no-dupchecks --wallet multibit.key
Counting passwords ...
Done
Using 4 worker threads
642544812 of 642544812 [#######################] 0:35:27, Time: 0:35:27
Password search exhausted
Press Enter to exit ...
#--pause --no-dupchecks --wallet multibit.key
%ia%0,5a
/*
Private key encryption is done based on a CMasterKey,
which holds a salt and random encryption key.
CMasterKeys are encrypted using AES-256-CBC using a key
derived using derivation method nDerivationMethod
(0 == EVP_sha512()) and derivation iterations nDeriveIterations.
vchOtherDerivationParameters is provided for alternative algorithms
which may require more parameters (such as scrypt).
Wallet Private Keys are then encrypted using AES-256-CBC
with the double-sha256 of the public key as the IV, and the
master key's key as the encryption key (see keystore.[ch]).
*/
/*
Private key encryption is done based on a CMasterKey,
which holds a salt and random encryption key.
CMasterKeys are encrypted using AES-256-CBC using a key
derived using derivation method nDerivationMethod
(0 == EVP_sha512()) and derivation iterations nDeriveIterations.
vchOtherDerivationParameters is provided for alternative algorithms
which may require more parameters (such as scrypt).
Wallet Private Keys are then encrypted using AES-256-CBC
with the double-sha256 of the public key as the IV, and the
master key's key as the encryption key (see keystore.[ch]).
*/
#!/usr/bin/ruby -w
class Cracker
def initialize(char_array, password_range)
@char_array = char_array
@password_range = password_range
end
def password_correct?(phrase)
print "basepassword" + phrase, "\t"
system("./bitcoind walletpassphrase basepassword#{phrase} 20")
case $?.exitstatus
when 0
puts "Found it! basepassword#{phrase}"
exit 0
end
return false
end
def generate_password( perm_number, password_length )
password=""
(1..password_length).each do |char_number| # loop through characters
char_reference = (perm_number / @char_array.length**(char_number-1)).floor % @char_array.length
character = @char_array[char_reference]
password << character
end
password
end
def do_combination( num_combinations, password_length )
(0..num_combinations-1).each do |perm_number| # loop through combinations for a given length
password = generate_password( perm_number, password_length )
return password, perm_number if password_correct?(password)
end
end
def crack()
(@password_range).each do |password_length| # loop to gradually increase password length
num_combinations=@char_array.length**password_length
password, perm_number = do_combination(num_combinations, password_length)
if password
puts "#{password} | Access Granted | #{perm_number} / #{num_combinations}"
return password
end
end
end
end
# I removed characters I was sure I didn't use
characters = "!$@01235@ABCDEFGIKLMNOSTWYZabcdefgiklmnopqrstuwyz".split(//)
cracker = Cracker.new( characters, (6..8) )
password = cracker.crack()
puts "No luck."
exit 1