Pages:
Author

Topic: Recover blockchain.info wallet password - 0.5 BTC bounty (Read 2405 times)

hero member
Activity: 2856
Merit: 768
Hello, did you recover your btcs?
No need for you to necrobump this old thread instead you can PM directly Parodium about this thing since the thread isnt been locked which i do presumed that the wallet hasnt been recovered. (maybe).
full member
Activity: 379
Merit: 112
Tips: 3DhgXE1BedBJY6uxjxai3Nsaj8sXGU4ite
Hello, did you recover your btcs?
newbie
Activity: 2
Merit: 0
I forgot my password, I do not have a 12-word phrase, but I know the password by 90%!
I got another purse while I was at Blokkchan. I'm trying to get a password for this method, known to me from a new wallet. Says the password was not found. What is the problem? Does this method no longer work?
If you don't have the 12-word phrase you will not be able to recover your account and it is hard to guess if what is the remaining 10% in your password.
You have a 10% chance to recover it by guessing the 10% password of your account.
I suggest you try every possible password that you use before in the history if this doesn't work there is no other way than using 12-word seed.

i will help you in recovering your btc you can contact me at [email protected]
sr. member
Activity: 1358
Merit: 253
With this case I'm worried that it will happen to me anytime and I will move my balance to some wallet which I think is easier to recover like Xapo or coinbase, unfortunately I can't give you a solution, hopefully you are lucky.
legendary
Activity: 3234
Merit: 2943
Block halving is coming.
I forgot my password, I do not have a 12-word phrase, but I know the password by 90%!
I got another purse while I was at Blokkchan. I'm trying to get a password for this method, known to me from a new wallet. Says the password was not found. What is the problem? Does this method no longer work?
If you don't have the 12-word phrase you will not be able to recover your account and it is hard to guess if what is the remaining 10% in your password.
You have a 10% chance to recover it by guessing the 10% password of your account.
I suggest you try every possible password that you use before in the history if this doesn't work there is no other way than using 12-word seed.
newbie
Activity: 2
Merit: 0
I forgot my password, I do not have a 12-word phrase, but I know the password by 90%!
I got another purse while I was at Blokkchan. I'm trying to get a password for this method, known to me from a new wallet. Says the password was not found. What is the problem? Does this method no longer work?
newbie
Activity: 41
Merit: 0
Hi, PM me if you still looking for somebody to walk you trough,... Cheers!
newbie
Activity: 1
Merit: 0
did you find it ?
legendary
Activity: 1498
Merit: 1164
If I know the wallet ID and wallet address - is there any way to retrieve the password? Is there any script for that?

 No back up unfortunately.

 Thank you in advance.

Did you not read the thread?
newbie
Activity: 1
Merit: 0
 If I know the wallet ID and wallet address - is there any way to retrieve the password? Is there any script for that?

 No back up unfortunately.

 Thank you in advance.
newbie
Activity: 4
Merit: 0
I think i got solution for your request
already recovered 2 passwords, so this is chance that it is possible
write me on email [email protected]
legendary
Activity: 1498
Merit: 1164
With regards to item #1... What happens if you enter the following URL into your webbrowser: https://blockchain.info/wallet/ENTER-YOUR-WALLET-ID-HERE?format=json

for example: https://blockchain.info/wallet/9bb4c672-563e-4806-9012-a3e8f86a0eca?format=json

Does the system prompt you to authorise the login attempt via Email? Do you get sent an email asking to confirm the login? If so, click authorise and try and load the URL again. You should see the wallet.aes.json text which you can copy/paste to a text file in preparation for using btcrecover.

Do you have the email address originally used to register the wallet? If so, you *might* be able to get the Blockchain.info support people to supply you with the wallet.aes.json... which will contain the encrypted "payload" data for your wallet... You'd just need to run the gauntlet of ID verification etc. But I've heard it is possible.

Hello,

I tried out your method, I received the confirmation email, however when returning to the previous tab it did not display the wallet.aes.json data, it remained the same.

Any other suggestions?

Did you have any luck downloading the blockchain.info json payload? 

I've had no success for a wallet for which I have lost the password.  Using the URL https://blockchain.info/wallet/?format=json only works for wallets that I've already accessed from the machine I'm using to access the URL.  In other words, it is cached.  If I try to access a wallet ID that isn't cached (I've never accessed it from the machine I'm using), I'm given a message stating that an auth email has been sent.  Even when I receive the email and click to approve auth, the browser still won't load the json showing the payload... I just get the same message stating an email has been sent.  Clearing cache, etc., doesn't help.

Anyone else have luck obtaining the wallet.aes.json information?

I managed to retrieve the wallet using the recover wallet function in btcrecover, modifying the URL directly did not work.

I decided to test just to see if I can duplicate the problem.

First,

https://blockchain.info/wallet/ENTER-YOUR-WALLET-ID-HERE?format=json
This only works if you're either logged in already or have access to the email address to allow clicking on the allow link or if no email was setup.

Assuming you have access to one of the three above, you can download the wallet.aes.json

To ensure this works, I created a new wallet:
04c51acb-cd25-443b-b476-24596510743b      with a password of Internet123

Going to https://blockchain.info/wallet/04c51acb-cd25-443b-b476-24596510743b?format=json

I get:
Code:
{"extra_seed":"9aad9898377c0512d95937251218be88f6819aea118b7b84f0285c489f8848bb8fdc96aa120e16ccb23aaff30470a8fedb01f0fa35b69a031d9f84b2e9b30cd0","auth_type":0,"initial_success":"Reminder: Verify your email.","real_auth_type":0,"payload":"{\"pbkdf2_iterations\":5000,\"version\":3,\"payload\":\"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\"}","symbol_local":{"symbol":"$","code":"USD","symbolAppearsAfter":false,"name":"U.S. dollar","local":true,"conversion":5677.96942186},"guid":"04c51acb-cd25-443b-b476-24596510743b","payload_checksum":"ee1b621250d9a4c616b6fe11f55b10def49883b35fdfc5345807d9194238713e","war_checksum":"8f7d54ba8f9fcc75","language":"en","symbol_btc":{"symbol":"BTC","code":"BTC","symbolAppearsAfter":true,"name":"Bitcoin","local":false,"conversion":100000000.00000000},"sync_pubkeys":false}

And, using the download script, I get:
Code:
E:\btcrecover-master\extract-scripts>download-blockchain-wallet.py
Please enter your wallet's ID (e.g. 9bb4c672-563e-4806-9012-a3e8f86a0eca)
> 04c51acb-cd25-443b-b476-24596510743b
Wallet file saved as 04c51acb-cd25-443b-b476-24596510743b
which contains:
Code:
{"pbkdf2_iterations":5000,"version":3,"payload":"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"}


Strange... The information for both is different.  So, let's see what extracting the data gives:

Code:
E:\btcrecover-master\extract-scripts>extract-blockchain-main-data.py 04c51acb-cd25-443b-b476-24596510743b
Blockchain first 16 encrypted bytes, iv, and iter_count in base64:
Yms65b72+MVTG6eM12J/uLxUT8CjFvE3rCa76KfmTVSjelWIEwAArdyA3Q==

Code:
E:\btcrecover-master\extract-scripts>extract-blockchain-main-data.py wallet-from-http.txt
Blockchain first 16 encrypted bytes, iv, and iter_count in base64:
Yms65b72+MVTG6eM12J/uLxUT8CjFvE3rCa76KfmTVSjelWIEwAArdyA3Q==

So, either method you use, the data extracted is the same.  This is good in knowing that either way results in the same extracted data.
So, now let's try to crack in via tokens.

I created a basic token file.  (basic.txt) which only contains:   Internet123   (Yes, the exact password - just to prove the wallet can be cracked if it gets the right password)

Code:
E:\btcrecover-master>btcrecover.py --tokenlist basic.txt --data-extract
Starting btcrecover 0.17.9 on Python 2.7.13 64-bit, 16-bit unicodes, 32-bit ints

Please enter the data from the extract script
> Yms65b72+MVTG6eM12J/uLxUT8CjFvE3rCa76KfmTVSjelWIEwAArdyA3Q==
Wallet difficulty: 5,000 PBKDF2-SHA1 iterations
Using 8 worker threads
0 of 1 [----------------------------------------------] 0:00:00, ETA:  --:--:--
Password found: 'Internet123'
Very nice.  It works.



Let's try with a couple of variables....   I change the token in basic.txt to:
Code:
%ia
nternet%1,3d
Without going into a long explaination, this will try passwords like:
internet0, Internet232, 2nternet1, 0nternet999, Anternet1, nternet00, and so on.

Code:
E:\btcrecover-master>btcrecover.py --tokenlist basic.txt --data-extract
Starting btcrecover 0.17.9 on Python 2.7.13 64-bit, 16-bit unicodes, 32-bit ints

Please enter the data from the extract script
> Yms65b72+MVTG6eM12J/uLxUT8CjFvE3rCa76KfmTVSjelWIEwAArdyA3Q==
Wallet difficulty: 5,000 PBKDF2-SHA1 iterations
Using 8 worker threads
96855 of 116602 [###############################-------] 0:02:30, ETA:  0:00:30
Password found: 'Internet123'

I wont go into anymore combinations as I only wanted to point out that it works.


To bad I still haven't cracked the password to my friends account which he lost the password to years ago.  It was only about .05 BTC though.  Maybe try again in a few more years.  Smiley




sr. member
Activity: 1036
Merit: 332
DMs have been disabled. I am busy.
With regards to item #1... What happens if you enter the following URL into your webbrowser: https://blockchain.info/wallet/ENTER-YOUR-WALLET-ID-HERE?format=json

for example: https://blockchain.info/wallet/9bb4c672-563e-4806-9012-a3e8f86a0eca?format=json

Does the system prompt you to authorise the login attempt via Email? Do you get sent an email asking to confirm the login? If so, click authorise and try and load the URL again. You should see the wallet.aes.json text which you can copy/paste to a text file in preparation for using btcrecover.

Do you have the email address originally used to register the wallet? If so, you *might* be able to get the Blockchain.info support people to supply you with the wallet.aes.json... which will contain the encrypted "payload" data for your wallet... You'd just need to run the gauntlet of ID verification etc. But I've heard it is possible.

Hello,

I tried out your method, I received the confirmation email, however when returning to the previous tab it did not display the wallet.aes.json data, it remained the same.

Any other suggestions?

Did you have any luck downloading the blockchain.info json payload? 

I've had no success for a wallet for which I have lost the password.  Using the URL https://blockchain.info/wallet/?format=json only works for wallets that I've already accessed from the machine I'm using to access the URL.  In other words, it is cached.  If I try to access a wallet ID that isn't cached (I've never accessed it from the machine I'm using), I'm given a message stating that an auth email has been sent.  Even when I receive the email and click to approve auth, the browser still won't load the json showing the payload... I just get the same message stating an email has been sent.  Clearing cache, etc., doesn't help.

Anyone else have luck obtaining the wallet.aes.json information?

I managed to retrieve the wallet using the recover wallet function in btcrecover, modifying the URL directly did not work.
newbie
Activity: 3
Merit: 0
With regards to item #1... What happens if you enter the following URL into your webbrowser: https://blockchain.info/wallet/ENTER-YOUR-WALLET-ID-HERE?format=json

for example: https://blockchain.info/wallet/9bb4c672-563e-4806-9012-a3e8f86a0eca?format=json

Does the system prompt you to authorise the login attempt via Email? Do you get sent an email asking to confirm the login? If so, click authorise and try and load the URL again. You should see the wallet.aes.json text which you can copy/paste to a text file in preparation for using btcrecover.

Do you have the email address originally used to register the wallet? If so, you *might* be able to get the Blockchain.info support people to supply you with the wallet.aes.json... which will contain the encrypted "payload" data for your wallet... You'd just need to run the gauntlet of ID verification etc. But I've heard it is possible.

Hello,

I tried out your method, I received the confirmation email, however when returning to the previous tab it did not display the wallet.aes.json data, it remained the same.

Any other suggestions?

Did you have any luck downloading the blockchain.info json payload? 

I've had no success for a wallet for which I have lost the password.  Using the URL https://blockchain.info/wallet/?format=json only works for wallets that I've already accessed from the machine I'm using to access the URL.  In other words, it is cached.  If I try to access a wallet ID that isn't cached (I've never accessed it from the machine I'm using), I'm given a message stating that an auth email has been sent.  Even when I receive the email and click to approve auth, the browser still won't load the json showing the payload... I just get the same message stating an email has been sent.  Clearing cache, etc., doesn't help.

Anyone else have luck obtaining the wallet.aes.json information?
newbie
Activity: 2
Merit: 0
Since you said you have your Wallet ID this might be an option for getting a backup wallet file:

"Blockchain.info - it's usually named wallet.aes.json; if you don't have a backup of your wallet file, you can download one by running the download-blockchain-wallet.py tool in the extract-scripts directory if you know your wallet ID (and 2FA if enabled)"

https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#running-btcrecover
newbie
Activity: 2
Merit: 0
Not sure how to go about this without the wallet backup file but assuming you are able to:
1)   Locate your Blockchain.info wallet backup file (it's usually named wallet.aes.json)
2)   Download and install Python 2.7.13
   https://www.python.org/downloads/release/python-2713/
3)   Download and unzip btcrecover.zip
   https://github.com/gurnec/btcrecover/archive/master.zip
4)   Save Unzipped folder so that it is easy to access (e.g. C:\python27\tools)
5)   Download and install PyCrypto (make sure to match to python version 2.7)
   http://www.voidspace.org.uk/python/modules.shtml#pycrypto
6)   Open command prompt as admin and cd to the python scripts directory (a) then install the following(b-d):
   (A) cd c:\python27\scripts
   (B) pip install coincurve==5.2.0 pysha3
   (C) pip install protobuf
   (D) pip install pylibscrypt
7)   Download this libsodium zip file, and extract it to a temporary location: https://download.libsodium.org/libsodium/releases/libsodium-1.0.13-msvc.zip
8)   Find the correct libsodium.dll file from the extracted files, it will be located at one of these two paths:
   Win32\Release\v141\dynamic\libsodium.dll
   x64\Release\v141\dynamic\libsodium.dll
   Choose 32 bit or 64 bit based on python version
9)   Copy the chosen libsodium.dll file into your C:\Python27 directory.
10)   Download and install one of the two update packages below from Microsoft, either the 32-bit version or the 64-bit version (the second) to match the version of Python that you've installed.
   Microsoft Visual C++ Redistributable for Visual Studio 2017 32-bit
   https://go.microsoft.com/fwlink/?LinkId=746572
   Microsoft Visual C++ Redistributable for Visual Studio 2017 64-bit
   https://go.microsoft.com/fwlink/?LinkId=746571
11)   Optionally, add GPU support for up to 100x better performance with Bitcoin Unlimited/Classic/XT/Core or altcoin wallets and 2x-5x w/ Armory wallets
   Review Install instructions:
   https://github.com/gurnec/btcrecover/blob/master/docs/INSTALL.md#windows-gpu-acceleration-for-bitcoin-unlimitedclassicxtcore-armory-or-litecoin-qt
   Download and install pyOpenCL
   https://www.lfd.uci.edu/~gohlke/pythonlibs/#pyopencl
   Review Use Documentation
   https://github.com/gurnec/btcrecover/blob/master/docs/GPU_Acceleration.md
12)   Create ‘token.txt’ file (allows for combinations of guesses):
   Create a new text file and save it in btcrecover directory (same directory as btcrecover.py)
   Include all your old passwords and guess passwords here.
   Follow rules in documentation for token file
   https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#the-token-file
13)   Alternatively, you can create a ‘passwordlist.txt’ file and save in the same directory
14)   Follow the documentation to run the extract script using your wallet back up file (wallet.aes.json)
   https://github.com/gurnec/btcrecover/blob/master/docs/Extract_Scripts.md#usage-for-blockchaininfo
15)   Using the base64 result from the extract script you can now start guessing passwords with btcrecover.py
16)   Open command prompt as admin and cd to the directory with btcrecover.py
   cd c:\python27\Tools\btcrecover-master
17)   Run btcrecover.py with desired command line options (use ‘--data-extract’ for comparing against base64 result). Choose either '--tokenlist filename.txt' option or '--passwordlist filename.txt' option See command line examples below:
   Ex. 1: btcrecover.py --data-extract --tokenlist tokens.txt
   Will prompt for base64 result then check based on tokens.txt file

   Ex. 2: btcrecover.py --data-extract --passwordlist biglist.txt
   Will prompt for base64 result then check based on biglist.txt (password list) file

   Ex. 3: btcrecover.py --data-extract --passwordlist biggerlist.txt --no-eta --no-dupchecks --typos 3 --typos-swap --typos-repeat --typos-capslock --typos-delete --typos-case
   Will prompt for base64 result then check based on bigerlist.txt (password list) file
   Accounts for up to 3 typos of various types (see Typos documentation)
   https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#typos
   Disables duplicate guess checking
   Disables time estimate calculation

18)   For additional command line options type:
   btcrecovery.py –h

Good Luck and hope this helps
BTC: 12TFbutWdy1dCAawSKHXn4fG1nEKHerMt5
sr. member
Activity: 2506
Merit: 368
Hi everyone.

I own a small network of powerful machines, and wrote a program which distributes cracking tasks amongst them. Because of this, I may have a powerful tool to help crack wallets. If you have forgot your wallet password, I might be able to help. Since the software is still in the test phase, I cannot guarantee anything, but I would be glad to try.
I think OP doesn't need it when it is not yet effective because it is on a test phase. Maybe you can get back here after you have proven that your software is effective and could at least crack a simple to complex (Mnemonic/Seed/Private Key/Pass Phrase) password. OP sure wanted to pay you a good price if you have ever pulled his lost password. And so far OP didn't find a hacker yet to be paid with 0.75BTC and it's quite a big money.
newbie
Activity: 3
Merit: 0
If you have 12 words passphrase you can generate or recover your password
Apologies to "hijack" the thread a bit, but I'm in a similar situation like the OP, with the exception that I have those passphrase words written down onto a piece of paper.
My problem is that I have 17 words, not 12, and they do not work. Anybody seen this and/or knows if e.g. the pasphrases changed?

Thanks a lot.
Ok, to answer myself: I created my blockchain wallet in Q2/2016. Today, that is regarded as "legacy" wallets, and no longer really supported.
The recovery passphrase for legacy wallets was called "mnemonic", and there is still a page where this 17-word long mnemonic can be used to recover a lost access to these legacy wallets:
https://blockchain.info/wallet/forgot-password?guid=

Thanks a lot guys & good luck with finding your solution.
newbie
Activity: 3
Merit: 0
If you have 12 words passphrase you can generate or recover your password
Apologies to "hijack" the thread a bit, but I'm in a similar situation like the OP, with the exception that I have those passphrase words written down onto a piece of paper.
My problem is that I have 17 words, not 12, and they do not work. Anybody seen this and/or knows if e.g. the pasphrases changed?

Thanks a lot.
newbie
Activity: 1
Merit: 0
Hi everyone.

I own a small network of powerful machines, and wrote a program which distributes cracking tasks amongst them. Because of this, I may have a powerful tool to help crack wallets. If you have forgot your wallet password, I might be able to help. Since the software is still in the test phase, I cannot guarantee anything, but I would be glad to try.
Pages:
Jump to: