Author

Topic: Old multibit.key file (Read 463 times)

HCP
legendary
Activity: 2086
Merit: 4361
April 16, 2021, 04:01:26 AM
#3
Sorry for not replying sooner... I keep forgetting to check this old Multibit board from time to time... it seems with the increase in BTC value there are more and more old multibit users coming out of the wood work Tongue

Anyway... have you tried using the openssl method to decrypt the .key file?
Code:
openssl enc -d -aes-256-cbc -p -md md5 -a -in multibit.key -out newtest.txt

This command (on Linux, but you can also install openssl for Windows) will prompt you for the password and then decrypt the .key file (simply change the multibit.key part to match your .key file) and create the .txt file that contains the decrypted text:

This is my "key_test.key" file:
Code:
U2FsdGVkX18u5HQe1dGcYI5vGqObV/G/+nHAoafGmGhrcAwz40smBfsj/B+VurCwtAC0Ba9QMoEU
lB2dMrGBLdDyYxtiQ1GsyYg3CZkSDZZmvlVo7pnYIO3fGCTmc85d



This is what happens when I run the openssl command in linux:



This is the contents of newtest.txt:
Code:
L2p3VjkRXfwAY8kfemFsh8HJ6Pfn4DxLxxsdL8XvZVfnTDZkGLjN 2021-03-30T17:17:06Z


If you're getting garbage output, it sounds like the .key file might be corrupt Undecided
HCP
legendary
Activity: 2086
Merit: 4361
March 18, 2021, 04:50:40 PM
#2
If the first line starts with "U2F" and looks something like this:
Code:
U2FsdGVkX18LSYm98B5HRgLWHgx35xMcsSpjjtdC9XG6iEYh9OC+vfyQA1fNmjEKs64cm/bntH7g
/AMeb5NNSEe9hzYAgp/DRvOR+GX9E95pGcl4Gb2AHGMyUfAww7uV

Then it is encrypted and you would need to know what the passphrase was that encrypted this file to be able to recover the key(s) that are stored in it.
newbie
Activity: 1
Merit: 0
March 12, 2021, 05:40:45 PM
#1
I found an old multibit.key file from oct 2013.  It contains two lines the first is 76 characters and the second is 52.

Is there any way to find out if this contains anything?
Jump to: