Search content
Sort by

Showing 16 of 16 results by despo4helpo
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 27/03/2023, 03:28:20 UTC
After entering the command (btcrecover.py --tokenlist tokenfile.txt --no-dupchecks etc. etc.) there are 2 popups: 1 asking for the xpub, the second for the seed phrase. Is this the same as the --mpk command?
Yes. If you don't specify it in the command line, then a pop up will ask for it.

Is 3 words the minimum number of relative anchors needed to be used for this function?
No, two would be the minimum. You can't use one since one can't be compared to zero others, but you could use two with ^r1^ coming somewhere before ^r2^.

Note that with relative anchors (but not fixed anchors), you can use the same relative anchor on multiple lines. So if I had one line with ^r1^, and two different lines both with ^r2^, then both of the ^r2^ lines would come somewhere after ^r1^, but in either order.

What's a doable and impossible number (hundreds of years) that can/can't be found?
As I say, it all depends on the format of your tokensfile, how many lines there are, the possibilities on each line, how much descrambling might be needed, etc. It also depends on how many guesses per second your hardware is capable of. If you share your tokensfile with the actual words redacted (feel free to PM it to me if you would prefer), I can do some rough math to work it out for you.

If you run without --no-eta, then it should calculate it for you, but in my experience this doesn't really work very well for large numbers and tends to just freeze up.

Bonus question: Is there a post or tutorial I can learn where to quote properly?
You just have to copy and paste the quote tags multiple times around each section of text you want to quote.

Thank you. You may hear from me soon. Just wanted to thank you publicly because I'm so grateful for your (and everyone else who has commented) inputs and advice!
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 26/03/2023, 02:55:25 UTC
Thank you! For the derivation path, being a native segwit wallet, wouldn't it always be m/84'/0'/0'?
Not necessarily. If you've made more than one account under the same passphrase, then it could be m/84'/0'/1' and so on.

I realize I may have used the wrong address limit now so while that was a waste of time, there is hope I find the right one now.
If you are searching using the xpub and --mpk, then you don't need to set an address limit anymore.

After entering the command (btcrecover.py --tokenlist tokenfile.txt --no-dupchecks etc. etc.) there are 2 popups: 1 asking for the xpub, the second for the seed phrase. Is this the same as the --mpk command?


If I use relative anchors like ^r3^Word3, ^r4^Word4, does it means those words are going be the 3rd or 4th words in the passphrase?
No, that would be the case if you were using fixed anchors rather than relative anchors.

Fixed anchors (^x^) place that word in a fixed position. Relative anchors (^rx^) place that word in relation to other relative anchors.

If you use ^3^Word3, then Word3 would be the 3rd word.
If you use ^r3^Word3, then Word3 would be placed somewhere between the words you set as ^r2^ and ^r4^, but there could be other words between them as well, and ^r3^ wouldn't necessarily be the third word.

Is 3 words the minimum number of relative anchors needed to be used for this function?


If I have word1 woRd2 w0rd3 all in 1 line, and word2, woRd2 w0rd2 in another line, how much time does each extra word take?
It's all going to depend on the size of entire tokens file. But if you change the number of possibilities in a single line from 1 to 2, then that is going to double your search space. Change another line from 1 to 2, and the will double it again, so 4x in total. So even a few extra possibilities can dramatically increase the search space.

I'm trying to figure out how many words is "doable". Is it 11, or 12? 20 takes thousands of years. So what's a doable limit to try and does each possible word in 1 line add to the time taken or not?
Again, it depends on what exactly you are searching. If you know all 12 words exactly but have them in the wrong order, then that's 12! = 479 million possibilities. If you know the order of 12 words, but each word could be one of four possibilities, then that's only 412 = 17 million possibilities. It will all depend on exactly how much you know and how much is unknown.

What's a doable and impossible number (hundreds of years) that can/can't be found?

Thank you! Replies in bold again.
Bonus question: Is there a post or tutorial I can learn where to quote properly? Lol
Post
Topic
Board Project Development
Re: The FinderOuter, a bitcoin recovery tool (v0.17.0 2023-02-27)
by
despo4helpo
on 26/03/2023, 02:40:12 UTC
What's the maximum number of allowed characters in the passphrase? It says 100 is too much. I don't think my passphrase is 100 but I put that since it's the maximum a Ledger will allow, which is what I used.
Brute-forcing 100 characters will never ever succeed. You'll probably have a very hard time with 10 characters already, if your password is that long your only chance is to remember (most of) it.

If I do remember most of it, where do I enter that data in FinderOuter?
Post
Topic
Board Project Development
Re: The FinderOuter, a bitcoin recovery tool (v0.17.0 2023-02-27)
by
despo4helpo
on 25/03/2023, 05:39:20 UTC
Hello.

I'm trying to find my passphrase. I have the 24 word seed phrase.
Where can I enter the (presumed) words known for the passphrase? If I try in Customchars, it says to remove duplicate letters.

What's the maximum number of allowed characters in the passphrase? It says 100 is too much. I don't think my passphrase is 100 but I put that since it's the maximum a Ledger will allow, which is what I used.
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 24/03/2023, 22:02:49 UTC
There is another tool that you can use to brute-force the wallet passphrase it was developed by Coding Enthusiast.

You can check that tool from his thread below

- https://bitcointalk.org/index.php?topic=5214021.0

Once you downloaded it just go to Missing Mnemonic Passphrase and try to brute-force your wallet just make sure that you remember some parts of your passphrase to speed up the process.

FinderOuter is great tool/software and more user-friendly. But with lack of GPU support, btcrecover is better choice on most cases.

I don't have computers with GPU so could give it a try. In FinderOuter where should I enter the words I think they are? Is it in "CustomChars"? If yes, do I put Word1Word2Word3 and it will try all the combinations from that?
Post
Topic
Board Bitcoin Technical Support
Merits 4 from 1 user
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 24/03/2023, 16:33:44 UTC
⭐ Merited by o_e_l_e_o (4)
That's the tricky part; not sure how to find the derivation path. Is the "fresh address path" (shown in the step 3 image from the link above) the same as the derivation path?
Almost. Take the fresh address it path it shows you under your xpub and knock the last two sets of digits off it to get the derivation path for your xpub. So if it shows m/84'/0'/0'/0/5, your xpub's path will be m/84'/0'/0'. Make sure to include the ' symbols, these are very important and will generate entirely different keys if you miss them out.

The last thing to be sure is that this xpub is definitely coming from the account protected by the passphrase, and not from the base account with no passphrase.

It's either one of these lists, or a combination of both. If separate, I'm confident of the order but yet it didn't work so something is off.
If the order is off, then you are really going to struggle. Based on your initial post of 15-20 words, and the fact that I can descramble 12 words in a little under an hour, then 15 words would come out at around 100 days and 20 words will be in the region of hundreds of thousands of years, even assuming you were 100% correct with all your words and symbols.

So, assuming you know the order, then I would try something like this initially:
Code:
^1^Code ^1^code ^1^C0de ^1^c0de
^2^test ^2^te$t
^3^mayor ^3^m@yor ^3^may0r ^3^m@y0r

And so on.

The ^x^ before each word fixes the position of that word. btcrecover will then take one entry from each line and assemble that in to a passphrase in that order to try. So on each line, you put every possible permutation of that word. This is also assuming no spaces between the words.

If that fails, then change your tokens file to all caps.
If that fails, then take your second wordlist (e.g. veg instead of fruit) and follow the same process.
If that fails, then combine your wordlists and follow the same process.

Note that if $ is the last character of a token, you will need to replace it with %S otherwise btcrecover will interpret it as an end anchor.

In terms of the numbers at the end, you can do what you are doing and put every possibility on a single line with $ at the end, or you can use a wildcard if you are unsure about the numbers. For example, %3,4d will try every 3 and 4 digit combination. Note that this will significantly increase your search space, however.

Thank you! For the derivation path, being a native segwit wallet, wouldn't it always be m/84'/0'/0'?

I've tried the combinations but need to narrow it down more I guess. I realize I may have used the wrong address limit now so while that was a waste of time, there is hope I find the right one now.
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 24/03/2023, 03:14:20 UTC
How did you export the xpub? If you are sure it is correct, then you can just use that directly instead of then deriving an address from it. Your search will also be a little faster using the xpub since btcrecover does not have to derive one or more addresses for each attempt.

I followed steps 1-3 from here: https://support.ledger.com/hc/en-us/articles/6275459128989-How-to-analyze-a-Bitcoin-BTC-account-xPub?support=true

Instead of using the --addrs argument, replace it with --mpk xpub6ABC...
If you also know the derivation path for that xpub, then include the following as well to narrow down the search further, replacing xx with the relevant numbers:
Code:
--bip32-path "m/xx'/0'/0'"

That's the tricky part; not sure how to find the derivation path. Is the "fresh address path" (shown in the step 3 image from the link above) the same as the derivation path?

Do you suggest any other commands to use to reduce the number of variables?
If you can give us much information as you know about your passphrase (obviously without revealing the actual words), then we can try to optimize things as much as possible.

It's either one of these lists, or a combination of both. If separate, I'm confident of the order but yet it didn't work so something is off.

I think all caps but could be wrong. It was done on the Ledger Nano S so I don't think I would have gone and changed caps and spaces between words...

Fruit1fruit2fruit3fruit4
OR
Veg1veg2veg3veg4
OR
Fruit1veg1veg2fruit2
There are probably some known number combinations, at the end. So I know to put all those in 1 line and use %s after each one.

To make matters worse, I may have replaced a with @ and s with $ and o with 0.

I'm a moron!
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 22/03/2023, 16:50:17 UTC
1. My passphrase is all lowercase or all uppercase. If it's all lowercase, then possibly, the first letter of the passphrase OR first letter of each word is proper case. It would have been a pain to do that on the Ledger though so I am hoping it's all lower or upper case. Is there any way to run only those combinations, or do I need to try each casetype as a separate run?
Separate runs. There is no straightforward way to tell it to change the case of your entire token file.

You can put multiple tokens on a single line, and it will only try one from each line, such as:
Code:
Token token TOKEN
Code code CODE
However, there is no way to say "If you pick the lowercase token from the first line, pick the lowercase token from all the other lines too". So you will simply have to make a token file with everything in lowercase, and once exhausted change everything to uppercase, and so on.

2. I'm relatively confident there are certain words, and even the order, and use + in front of those. The other words are in the middle but I'm not certain how the "relative anchor" works.
If you are certain a word appears somewhere, but you don't know where, then use +
If you know the exact position of a word, for example "This is definitely the fourth word", then use + ^4^
If you have three words you think WordA comes first, WordB somewhere later, and WordC later still, then you would use something like this:
Code:
+ ^r1^WordA
+ ^r2^WordB
+ ^r3^WordC
This fixes these word positions relative to each other. WordB will never be tried before WordA, but there could still be other words between WordA and WordB.
If you have three words and you know they are consecutive, then combine them in to a single line like this:
Code:
+ WordA%sWordB%sWordC
The %s will be replaced by a single space.

3. Complicating things more, I may have replaced a's with @, s with $ etc. I have the custom-typos map but that becomes way too many combinations. I think I did it only for the first a or s in a word and not all. I.e., Emb@rra$s
Combine these on the same line to try only one of them at a time. Example:
Code:
Embarrass Emb@rrass Embarra$s Emb@rra$s

Thank you! I'm glad to see you're still active here. I've seen so many posts from you while helping others over the years. Thanks for clarifying about the relative anchors; it's much clearer now!

Do you suggest any other commands to use to reduce the number of variables?
I'm using the latest version of btcrecover.
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 22/03/2023, 16:04:16 UTC
  • In btcrecover, it's correct to say the address limit is 1, right?
  • Is there a way to tell btcrecover the address format to speed it up and not check every format?
  • The "address limit" tells btcrecover how many 'address_indexes' to derive (address_index starts at '0'),
    so if you're not certain of your address' index, better leave it with higher or default value.
    But if you're absolutely certain that it's the very first address that you've derived (not just the first to receive bitcoins), then '1' is enough.

    Is there a way to find out whether it's the first derived address or not? I do have the wallet in my Ledger desktop app. I also have the xpub but wasn't 100% certain I got it the correct way so thought using the address would be better.
  • You'll be providing it with your address with --addrs so why do you have to provide the format?
    Anyways, --skip-uncompressed can be added to skip searching from uncompressed pubKeys which Ledger doesn't support.
I think I read somewhere that it searches all the formats and stating the current format will reduce the search parameters. Perhaps that's been updated in the latest version?

Thank you for the support!
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 17:57:30 UTC
I have something to clarify. Blockchain explorer tells me that:


This address has transacted 1 times on the Bitcoin blockchain. It has received a total of XYZ BTC $XYZ and has sent a total of 0.00000000 BTC $0.00 The current value of this address is XYZ BTC $XYZ.
The address format is Bech32 (P2WPKH). The address starts with bc1.

  • In btcrecover, it's correct to say the address limit is 1, right?
    Is there a way to tell btcrecover the address format to speed it up and not check every format?
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 17:48:25 UTC

Yeah it runs offline mate just go to https://github.com/sc0tfree/mentalist/releases/tag/v1.0 and download Mentalist-v1.0-OSX.zip


Also running something offline doesn't always make it secure, this is a protip. If you want to be extra safe, Run this on a live usb or an old laptop with the network device removed &/or disabled from the bios.


Malware can aggregate data offline for posting it out later on, also crash reports, memory persistence happen too.

I didn't really realize that; thank you! I did plan on moving everything out, if ever found and changing the passphrase etc. before formatting the laptops and enabling wi-fi. I like your suggestions though.
Is there a Windows version of Mentalist?
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 17:40:18 UTC
Download Mentalist from https://github.com/sc0tfree/mentalist

It's an amazing tool, easy to use and helps you build a custom wordlist.

With btcrecover you can load the wordlist with the --passwordlist command (afaik),

with mentalist can use the GUI and have a better understanding of how large the wordlist will also be.

The mask options have been confusing for me in btcrecover, it does a good job at checking if the password is correct most of the time but the wordlist is better generated with mentalist.


You also mentioned macbook, best thing to do is export all the passwords from the keychain and create a wordlist with them.

You might also want to check the better branch of btcrecover it's over at https://github.com/3rdIteration and the maintainer has great videos at https://www.youtube.com/@CryptoGuide

Thank so much, Mentalist looks interesting. I hope I can run it offline!
I am using the latest version of Btcrecover as I only started this journey a few weeks ago. I hadn't used the Macbook at the time of creating the passphrase. Entering it on the Ledger Nano S was the only way. Nice tip though. Smiley
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 17:09:39 UTC
There is another tool that you can use to brute-force the wallet passphrase it was developed by Coding Enthusiast.

You can check that tool from his thread below

- https://bitcointalk.org/index.php?topic=5214021.0

Once you downloaded it just go to Missing Mnemonic Passphrase and try to brute-force your wallet just make sure that you remember some parts of your passphrase to speed up the process.
Thanks. I did try this previously however I couldn't quite understand the alphabet use case. I tried it anyway and it had crashed when I woke up, lol.
I couldn't get it working on a Macbook unfortunately which would have been way faster vs. my Windows laptop.
Post
Topic
Board Bitcoin Technical Support
Re: Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 15:57:01 UTC
I'm sorry to read that you lost access to your bitcoin.

However I'm not sure that I fully understand, did you lose the seed phrase associated with your ledger?
As far as I know, ledgers have a code with X digits, not a password in words, right?

Can you tell us which wallet you used when you created your password?
Normally your seed should be 24 words long, if you didn't add any. If your wallet was Electrum for example, then your seed phrase would only be 12 words.

Btcrecover is a great tool, as hashcat is too. But I am not sure to understand enough your exact problem to be able to advise 1 specific tool

Good luck with your coins!

Thanks for your message. I do have the 24 word seed (I'll update my original post). Ledger does offer the option to create a passphrase that's attached to a pin.
Post
Topic
Board Bitcoin Technical Support
Merits 6 from 3 users
Topic OP
Passphrase recovery with Btcrecovery
by
despo4helpo
on 21/03/2023, 14:23:47 UTC
⭐ Merited by o_e_l_e_o (4) ,iwantmyhomepaidwithbtc2 (1) ,ETFbitcoin (1)
I'm trying to use Btcrecover to find my passphrase. I entered it on a Ledger Nano S and I thought I was sure of the words, but obviously I'm wrong.
My passphrase is relatively long; possibly 15-20 words all put together.  I've tried multiple custom token lists to no avail, and wondering if I'm doing something wrong.

When using --listpass, I've noticed that if -typos-capslock is enabled, it tries combinations of lowercaseUPPERCASElowercase.

1. My passphrase is all lowercase or all uppercase. If it's all lowercase, then possibly, the first letter of the passphrase OR first letter of each word is proper case. It would have been a pain to do that on the Ledger though so I am hoping it's all lower or upper case. Is there any way to run only those combinations, or do I need to try each casetype as a separate run?

2. I'm relatively confident there are certain words, and even the order, and use + in front of those. The other words are in the middle but I'm not certain how the "relative anchor" works.

3. Complicating things more, I may have replaced a's with @, s with $ etc. I have the custom-typos map but that becomes way too many combinations. I think I did it only for the first a or s in a word and not all. I.e., Emb@rra$s

Any thoughts/suggestions/scripts/other tools than btcrecover you can suggest?

Thank you for joining me on this recovery journey.
Post
Topic
Board Wallet software
Re: Looking for a working configuration for a BTCrecover seedlist token file
by
despo4helpo
on 21/03/2023, 04:24:25 UTC
1.1 billion again and it's hung up badly but started up again after an hour. Didn't get the process kill code yet but I got a feeling it's coming. Gonna let this play out and see what happens but I think this is it for me on this angle. Gonna have to get a better setup before trying again but at least I know I got the winning formula, just need the right tools to work it out.

One thing of note. While getting to 1.1 billion, it seems to have been running off the RAM because the 6 disk raid array were not blinking. Ever since the hangup, it's running much slower with less results and all 6 disks are blinking like it's Xmas.

Maybe I'll be back in a month or so. Thanx to everyone who contributed. For now I may be beaten, but I'm far from defeated.

I read your saga with interest. 2 years later, have you had any success?