Post
Topic
Board Development & Technical Discussion
Merits 2 from 1 user
Re: Wallets from 2014 vs Wallets from 2021
by
NotATether
on 07/04/2021, 06:11:10 UTC
⭐ Merited by ETFbitcoin (2)
1. What does bitcoin2john.py do?

People mainly run bitcoin2john on wallet files to get the hash, which can then be attacked by

2. What does each field of the wallet represent? ? Link with info?

Achow gave you a good answer for this so I will skip to the next one.

3. Any ideas about wallet versioning?

If a new wallet version ever changes how the hash is created, the outputs of bitcoin2john will have different values, for example salt length or number of rounds. It just scrapes this information from the wallet file.

5. And more importantly ... Any ideas to keep trying to decrypt the wallet?

The next step is to download and run hashcat and run it with the options hashcat -a 0 -m 11300 <paste the hash here> <dictionary file>. -a 0 stands for attack mode 0 which just uses a dictionary file with a password on each line, it's good if you have a large number of passwords you think you used or you used an easy-to-guess password. There's also a "mask mode" you can toggle to construct a pattern to match each characters of a potential pattern against. -m 11300 interprets the hash as one from a Bitcoin or Litecoin wallet.dat file, and it'll probably work for your dogecoin wallet too. Then you paste the hash

For the hash you need to paste the entire line you for from bitcoin2john.py. Then you need to make a dictionary file or download one from the internet. But if you remember using some unique password then you're probably better off making the file yourself.

Instead of putting the hash on the command line you can also put all 5 hashes in a file and pass that in place of the hash.



4. Any place where I can find technical information of this level?

You don't need to understand every field of the bitcoin hash because the important part is just pasting it into into hashcat and it'll do the brute forcing work for you.