Post
Topic
Board Development & Technical Discussion
Re: BitCrack - A tool for brute-forcing private keys
by
gsciservices
on 25/03/2021, 14:19:03 UTC
@fxsniper

Here is how my random "BitCrack" works. I call it Randomonium or VanBitKraken (since it is based off of VanitySearch and BitCrack). It can regenerate random points every so many keys based off of user input or user can decide to just let the program create random points throughout a range and search sequentially from each point generated.
With the flags/setup you see below, I am telling the program to search for 1Be2U address, generate new random points every 1600 Mkeys checked. I am also tell the program to search in the 36 bit range (900000000) via the boomT flag and setting the bits via the bitz flag to 32. So all random points will start with a 9 and random 32 bits, as evident by the keys below. I have it to stop once it finds the key, that's why the program stopped. Just a small sample size to show you how it works. I know there are some versions of BitCrack out there that have a random feature but I do not know which ones work. I think BitCrack generates x amount of points (based off of your -b -t -p settings) and spreads those points over the range you have identified in the --keyspace flag, but I could be wrong.
Code:

C:\Users\your\Documents\BitRangeFinderWithRandomonium>RandomoniumV1 -t 0 -r 1600 -stop -gpu -gpuId 0 -bitz 32 -boomT 900000000 -o FoundKeysWithRandomonium.txt 1Be2UF9NLfyLFbtm3TCbmuocc9N1Kduci1
Rando-monium
Searching For: 1Be2UF9NLfyLFbtm3TCbmuocc9N1Kduci1 [Compressed]
Started at Wed Feb 24 18:41:55 2021
CPU Threads Used: 0
GPU: GPU #0 GeForce GTX 1060 6GB (10x128 cores) Grid(80x128)

Key 0: 90FB029C9
Key 1: 915AB8BEF
Key 2: 94566471B
Key 3: 9B32AD4C5
Key 10236: 916FC7D4F
Key 10237: 9941AA5CC
Key 10238: 9CA0313F6
Key 10239: 9CD679F6E
Key 0: 971B253A7
Key 1: 9747E23CC
Key 2: 97155A495
Key 3: 95ADB5819
Key 10236: 94C80D1C1
Key 10237: 9718F18A5
Key 10238: 9733219BB
[424.30 Mkey/s][GPU 424.30 Mkey/s][Total 2^30.66][Prob 0.0%][50% in 7.5709e+31y][Found 0]
Key 0: 975D40E2C
Key 1: 94693B865
Key 2: 9CB0359C2
Key 3: 9A7E99691
Key 10236: 997802E90
Key 10237: 9C4F7F057
Key 10238: 9A619E828
[402.27 Mkey/s][GPU 402.27 Mkey/s][Total 2^31.91][Prob 0.0%][50% in 7.98551e+31y][Found 0]
Key 0: 94824A22E
Key 1: 98D8DF9B2
Key 2: 95FF97060
Key 3: 90D7649EB
Key 10236: 99728C9A7
Key 10237: 942FC0681
Key 10238: 9B6305716
[396.73 Mkey/s][GPU 396.73 Mkey/s][Total 2^32.57][Prob 0.0%][50% in 8.09702e+31y][Found 0]
Key 0: 9502B7D4F
Key 1: 9A50EB31E
Key 2: 9137FF051
Key 3: 98459EFC4
Key 10236: 9A4E0E1A3
Key 10237: 955C27269
Key 10238: 9344F13EE
[396.68 Mkey/s][GPU 396.68 Mkey/s][Total 2^33.03][Prob 0.0%][50% in 8.0979e+31y][Found 0]
Key 0: 90713B8A5
Key 1: 95F65F231
Key 2: 96C034F9B
Key 3: 9D5E97324
Key 10236: 9099689AA
Key 10237: 9673E3AB2
Key 10238: 9E37BEC45
[392.72 Mkey/s][GPU 392.72 Mkey/s][Total 2^33.37][Prob 0.0%][50% in 8.17973e+31y][Found 0]
Key 0: 98ECC53D8
Key 1: 98D4A705E
Key 2: 9EE3F71FB
Key 3: 9FCDC5825
Key 10236: 91581FDF1
Key 10237: 96B2A59CF
Key 10238: 9DA85DB2D
[392.74 Mkey/s][GPU 392.74 Mkey/s][Total 2^33.64][Prob 0.0%][50% in 8.1792e+31y][Found 0]
Key 0: 9524454BC
Key 1: 911B85D89
Key 2: 964F741BA
Key 3: 9AA26E965
Key 10236: 93D1494B2
Key 10237: 9680AC923
Key 10238: 9FAFE8130
[392.75 Mkey/s][GPU 392.75 Mkey/s][Total 2^33.87][Prob 0.0%][50% in 8.17905e+31y][Found 0]
Key 0: 997B54EDC
Key 1: 999C24D45
Key 2: 9A1DBE828
Key 3: 9C151CB30
Key 10236: 95EF8F151
Key 10237: 9C899397C
Key 10238: 9A032F0C9
[392.80 Mkey/s][GPU 392.80 Mkey/s][Total 2^34.07][Prob 0.0%][50% in 8.17792e+31y][Found 0]
Key 0: 9E1CD4F93
Key 1: 999311CD2
Key 2: 92FFE0C75
Key 3: 917BB7886
Key 10236: 951B19828
Key 10237: 908EAA926
Key 10238: 9C6AEA820
Key 10239: 9AE046F3E
C:\Users\your\Documents\BitRangeFinderWithRandomonium>pause
Press any key to continue . . .



Randomonium or VanBitKraken is available; please share to us...