Author

Topic: Lost my keys. (Read 327 times)

newbie
Activity: 3
Merit: 0
November 27, 2018, 09:19:11 PM
#15
I only use HD wallet and keep 24 recovery phrase...Easier for a poorly remembered person Grin
newbie
Activity: 6
Merit: 3
November 26, 2018, 09:51:49 AM
#14
@HPC indeed u did mention it. The strange thing is when u make a backup, either using 'save as' or 'export', keepass doenst send the .key file with the kdbx. So you assume there is no keyfile being used and yet it does. Indeed could be problematic, im glad the fresh install did not delete it or i would have lost it all. @LoyceV, thanks mate, very good tip indeed. I got abit careless and annoyed cuz the pc bugged out and thus, seeing i knew my password 100% out of hearth, i just went with it. Could have cost me there. Cheers!
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
November 26, 2018, 05:27:40 AM
#13
Glad you solved it!
I have one tip for the future: always test your backups before relying on them. With KeePass, you can test your backups in a different environment by starting your PC from a Linux LIVE DVD:
Download and use offline. Use for example Ubuntu or Knoppix from a LIVE DVD without ethernet/Wi-Fi
Knoppix has KeePassX installed by default, I'm not sure about Ubuntu.
HCP
legendary
Activity: 2086
Merit: 4361
November 25, 2018, 11:31:06 PM
#12
As I suspected... the "keyfile".

Seems like an interesting design decision that Keepass have made there... and could be quite problematic for people who aren't paying attention due setup and/or who don't make "proper" backups of things!

Still, glad you got it sorted out... thanks for reporting back how you solved it.
newbie
Activity: 6
Merit: 3
November 25, 2018, 07:44:35 PM
#11
Folks i found it: https://sourceforge.net/p/keepass/discussion/329221/thread/d283ac7a9d/
I posted on keepass and it seems, due to fresh install, keepass could not find the keyfile. Not its strange, because i never refered to a keyfile when unlocking. It seems to be something keepass did out of it self in the previous versions. I am very thankful for your reactions in these dark moments Smiley could have lost alot because of this. Thank you again guys!
newbie
Activity: 6
Merit: 3
November 25, 2018, 06:17:43 PM
#10
Thanks again guys really appreciate the help. @HCP i will try the btcrecover tho i dont hav phyton installed nor ever worked with it so i will need to do some digging first.
@Jack thanks, would really appreciate the help! I will follow up on the link u sent, hope i can figure it out.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
November 25, 2018, 05:48:49 PM
#9
From the script I gave you the link for, you have to import your own list of available passwords. I can make you something to generate that list tomorrow if you’d like.
HCP
legendary
Activity: 2086
Merit: 4361
November 25, 2018, 05:47:06 PM
#8
You can use btcrecover to generate a list of passwords from a "token" file... it can be a bit complicated, and requires that you have Python installed, but it works.

The theory is you can pass it a file that includes the "building blocks" of a password... and it will generate all the various combinations of those blocks. For instance, if your token file was:
Code:
!1234
1234!
Password

It would generate:
!12341234!Password
!1234Password1234!
1234!Password!1234
1234!!1234Password
Password1234!!1234
Password!12341234!

It supports all sorts of nifty things like "anchors", (so you can specify that a particular token like "Password" is always used in position 2 etc.), wildcards, common typos etc.

Refer here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#the-token-file

So, for you... it would be something like:
Code:
!1234
^2^Password
1234!

That way, Password would always be the 2nd token... and it would generate:
!1234Password1234!
1234!Password!1234
newbie
Activity: 6
Merit: 3
November 25, 2018, 05:35:52 PM
#7
thanks HPC,

I only used a masterkey, no keyfile and or windows account. I did see the post from jack and ill try and see if i can make it work.

What might be of use is a way to mix a few combinations: i am now only doubting the first four letters used in front and at the end of the password. It should be: 1234!Password1234! but for whatever reason it could be !1234Password!1234 or 1234!Password!1234 etc.

Any one know of a tool that can do this for you?
HCP
legendary
Activity: 2086
Merit: 4361
November 25, 2018, 05:05:24 PM
#6
Is it possible that you used multiple "keys" to secure your Keepass database and now you're missing one? According to the Keepass documentation, you can secure your database using one, some or all of the following:

Is there anyone with a script that can help me out? I am running Win 10.
That first link provided by jackg was demonstrating a Windows Powershell script for bruteforcing... That should work with Win10, but you'd still need to generate your own password list to run against your database, as it seems unlikely that any of the common password lists available online would contain your password.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
November 25, 2018, 04:47:06 PM
#5
I wouldn’t run the software directly off windows. Have you ever used Linux before? That’ll probably be better and faster for this and it means you won’t keep any viruses on your windows 10 system. It’s dofficult to run Linux on windows 10 machines though now as they’re designed to not look for other devices to boot from to protect against boot loader viruses.
newbie
Activity: 6
Merit: 3
November 25, 2018, 04:32:31 PM
#4
Thanks for the reply guys. Ill ook in to the google links, thanks for that Jack. Ill give update laters. @Bit no it wasnt hacked. I checked my eth wallet and all funds are still there. I am also using 2FA so just getting to keepass wont do to get access to exchanges, etc.

Is there anyone with a script that can help me out? I am running Win 10.
legendary
Activity: 2352
Merit: 6089
bitcoindata.science
November 25, 2018, 04:21:07 PM
#3
You are looking for a" brute Force" software or script.

I never tried to use those, but you can Google "brute Force" keepass or something like that...

It is possible that your keepass was hacked.? I have never used these kind of programs before, because LastPass qas hacked, so I decide to handle passwords on my own.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
newbie
Activity: 6
Merit: 3
November 25, 2018, 03:56:35 PM
#1
Howdy folks,

As i was trying to be safe i installed keepass to manage everything crypto and have been working with the program for some time now. It seems however, even though i am 100% sure i am using the right password, keepass is now rejecting my keys after i am trying to acces it after a few months. The reasons i know for sure the password is right, is that have named the db.file such as to give me a hint of what the password is. Also i have made many backups of the original db file and have used the same key over and over again to access the file.

However it may be keepass is rejecting it. Thus i can come to no other conclusion then that i must have forgoten a part of the password and or a double key has entered the password and as such i cant access the file anymore.

The only good part is i know 90% of the password. I have, seeing keepass is rejecting the keys, started to doubt about the other 10%. To give an example: the password is something in the order of $567Cryptokey567$ Now i am sure about the Cryptokey but i am not sure about the first four letters and later 4. I might have mixed these up or anything of the sort.
I was hoping if anyone of you knows a way to shuffle these around so as to get the right password.

Any help is welcome!
Thanks.

Jump to: