Search content
Sort by

Showing 11 of 11 results by rterwedo
Post
Topic
Board Bitcoin Discussion
Topic OP
Coinbase pro loses access to coins/wallet/portfolio
by
rterwedo
on 23/04/2021, 05:52:55 UTC
Any one else experience the coinbase pro issue where all the coins disappeared (they just came back) and you could not see or sell them?

This was in mobile and online...

I took screenshots and video.

[url]https://imgur.com/a/arUeNS2
Post
Topic
Board Bitcoin Technical Support
Merits 1 from 1 user
Re: Decrypt private key by passphrase alone, possible?
by
rterwedo
on 31/03/2021, 13:50:20 UTC
⭐ Merited by NotATether (1)
I have a wallet.dat file that I recovered from a hard drive using recovery software. I ran pywallet through it, and all it showed was one encrypted private key and a salt and I knew the correct passphrase, which I used . I have also used pywallet on the full 400G drive, and all those recovered files found by that method have included address, public key, master key etc. The lone encrypted private key is different to any of the ones found by doing the full drive search.
why make it so hard?, you have a wallet.dat file, if you have that password, you can easily get the private key by dumpwallet command on the console. You also don't need to sync network or download the full blockchain for that.

The lone encrypted private key is different to any of the ones found by doing the full drive search.
I guess it's not bitcoin's private key.
I have already used dumpwallet with pywallet on the recovered wallets I found with a full drive scan. This is a wallet.dat I found in a lost partition by using recovery software. The file won't dump like the other wallets, as I think it is corrupted, and shows as 96kb before using pywallets dumpwallet command. The resulting dumped wallet is only 32kb and says "wallet is encrypted passphrase is correct" but unlike the others it shows only one encrypted private key and nothing else apart from salt and a number. The one encrypted key is a different alphanumeric number to any of the other encrypted private keys I have recovered, so obviously it could be the one I'm after. None of the wallets are usable in the normal way in bitcoin core no matter what command you use as they are corrupted. I have used the passphrase on the other recovered wallet.dats and it shows all the addresses, private keys, mkey etc ie it decrypts the wallets.


The old encryption actually consists of 2 parts.  A master key is hardened and encrypted with your passphrase.  This is what you lock/unlock when entering it.  The private key is then encrypted with the plaintext of the master key + 2xSHA256(public_key) as the IV.  In order to decrypt a private key you need the plaintext of the master key + public key (which is typically stored in plaintext in the wallet).

If I had to guess - you either have an unencrypted private key already, just in a different format OR the tools errored when trying to process the wallet file because its corrupted.

Since you are dealing with corrupt data you need to do byte by byte computations/comparisons.
Post
Topic
Board Bitcoin Technical Support
Re: Structure of a master key in old core wallet
by
rterwedo
on 28/03/2021, 11:40:37 UTC
Is a master key in the old JBOK wallet simply a private key (with a different name) ie is it the same format as a private key?  I am trying to scan individual bytes to look for it as this wallet was not born encrypted....OR does it just generate a master key on the fly when you encrypt ?
It is not a private key nor is it stored in any way similar to a private key. The master key is generated when you encrypt. It is never stored unencrypted.

The thing to look for is a record that begins with mkey

Thanks - yes I have that.  I was investigating the encryption bug on 0.4.  It stored keys in plaintext (even for encrypted wallets) in the wallet.dat, logs and __db00X files per Gavin here:  https://bitcointalk.org/index.php?topic=51474.msg616068#msg616068

We have had success finding them in the wallet.dat however the logs and __db files have been a bit more difficult to process.

I was wondering if the master key got mixed up in this db issue as well.   It would provide an alternate means of unlocking the private keys as in my case half the wallet was floating around in plaintext but my addr with coins on it happened to be in the other half.  =)
 
Post
Topic
Board Bitcoin Technical Support
Topic OP
Structure of a master key in old core wallet
by
rterwedo
on 28/03/2021, 01:34:21 UTC
Encryption was implemented in core v 0.4.  A master key was added that encrypts the private keys.  (The master key itself was encrypted via various mechanisms). The master key unlocks the private keys.

Is a master key in the old JBOK wallet simply a private key (with a different name) ie is it the same format as a private key?  I am trying to scan individual bytes to look for it as this wallet was not born encrypted....OR does it just generate a master key on the fly when you encrypt ?

ie a private key typically starts (back then) as 0x01 0x01 0x04 - are there any telltale signs of an unencrypted master key?
Post
Topic
Board Bitcoin Technical Support
Re: Accessing wallet.dat file on corrupted Hard drive
by
rterwedo
on 28/03/2021, 01:18:47 UTC
Is the wallet encrypted?  If not why not just scan the HD contents (assuming it can be mounted) looking for the private keys?

Its relatively straightforward, no cracking or anything is needed.
Post
Topic
Board Bitcoin Technical Support
Re: Help me to recover 33.54 BTC from a corrupt wallet.dat, I'll pay you a Reward!
by
rterwedo
on 27/03/2021, 23:52:13 UTC
If your wallet is password protected and damaged I am not sure how you will solve this problem!

It says in the OP the wallet isn't encrypted according to his client, and last transaction is from August 2011, Bitcoin-Qt 0.4.0 with encryption wasn't released until a month later.

Or the client got it wrong and encrypted it on his own, or it was some sort of watch-only wallet.

.4 clients (encrypted or not) often left private keys able to be extracted in plaintext, it was a known bug.  In my case 50% of the private keys were left in the encrypted wallet in plaintext and there are other places to look for traces as well.  We wrote our own stuff but there is code floating around.
Post
Topic
Board MultiBit
Re: Help recovering Multibit Classic with encrypted private key but without password
by
rterwedo
on 23/01/2018, 22:11:40 UTC
Would i be able to use hashcat without any technical knowledge

Prob not, its complicated.

Our setups took a bunch of time to perfect.
Post
Topic
Board MultiBit
Re: Multibit - Can not get into wallet - password CORRECT
by
rterwedo
on 23/01/2018, 21:59:58 UTC
Your wallet probably has a well known problem that's been discussed in numerous threads here. There's some solutions you can try in this quote. If you read through the threads in this board you will find more about the problem, and alternative solutions.


... your wallet probably has a well known bug. The simplest fix is to install bread wallet on an iPhone or newer android phone, and use your multibit HD wallet seed words to create a new wallet in it. Afterwards all the addresses and balances from your multibit HD wallet will appear in bread wallet, and you can send your coins wherever you like.

According to dfevvbox bread wallet running on an iPhone can only use 12 word multibit HD wallet seed phrases.

Breadwallet won't work with 18 word on iOS it says seed should be 12 word

On the other hand, HCP says bread wallet running on an android can import both 12 and 18 word multibit HD wallet seed phrases.

I was honestly expecting it to say the same thing when I tried it on Android, but it worked perfectly with 18 words...

Unfortunately bread wallet won't install on older android phones, but HCP says "Simple Bitcoin Wallet" installs on them and that it can use MultiBit HD seeds.

...f you have an older Android device "Simple Bitcoin Wallet" also supports MultiBit HD seeds (tested with 12 and 18 word seeds).



If you can't use any of those solutions there are detailed instructions for using an offline webpage to extract the private keys from your MultiBit HD seed words at this link.

https://bitcointalk.org/index.php?topic=1777815.msg17773212#msg17773212

There are screenshots of the settings to use in that offline webpage at this link.

https://bitcointalk.org/index.php?topic=1785575.msg17819126#msg17819126

After you get your private keys you can install electrum and import them into it using the instructions here.

http://docs.electrum.org/en/latest/faq.html#can-i-import-private-keys-from-other-bitcoin-clients



Where exactly is the bug outlined? Called?  I see numerous mentions of it all over as "Password issue" but not exactly what the bug was.  I do not know the exact pwd and can crack keys pretty easily but I am not finding it (ie we know what chars, how long etc, but it not being found).  We have done it on a bunch of test cases fine.

I am trying to see how it could impact the hash used for cracking if at all.  Add into the mix a non US non EN keyboard was used.

To clarify it was  multibit classic wallet ~early 2014

Any help would be great.
Post
Topic
Board Development & Technical Discussion
Re: Number of dynamic SHA rounds on core wallet encryption - specs
by
rterwedo
on 22/12/2017, 09:43:15 UTC
The number of iterations is only changed when the encryption is changed, i.e. a new password is set. The number of iterations will not change on any unlock of the wallet.

Thank you for the confirmation!
Post
Topic
Board Development & Technical Discussion
Merits 1 from 1 user
Number of dynamic SHA rounds on core wallet encryption - specs
by
rterwedo
on 20/12/2017, 10:53:04 UTC
⭐ Merited by ETFbitcoin (1)
Hi - long story short, been going over the original spec for wallet encryption, and the dynamic number of SHA rounds used in a wallet for core ~.4.

https://github.com/bitcoin/bitcoin/blob/6b8a5ab622e5c9386c872036646bf94da983b190/doc/README

Lines 77-79

Is this meant to be taken literally, in that given a wallet encrypted on machine 1, with a dynamic number of rounds X, if that wallet is moved over to a new machine and subsequently opened/decrypted - would X stay the same or take on the specs of machine 2?  (It appears it would only change if pwd is changed)

We are working on a recovery for an owner with multiple wallets.  Our process has been to go after the one with the least amount of SHA iterations (obviously bc its faster) even tho that is the one without the coins in it, under the assumption the pwd is the same or similar to the wallets with higher SHA rounds and at the worst will provide confirmation of pwd formatting possibly used in the harder wallets.

I am just trying to account for any reasons the wallets rounds may be different.

1) Pwd changed on a new faster machine
2) Brand new wallet on new machine (also possible bc the addresses are different, although it could make sense he used a similar format for new wallet)
3) ***Wallet opened on new faster machine but pwd is not changed

#3 is what I am asking about.

Thanks!
Post
Topic
Board Bitcoin Technical Support
Security of whole wallet with unencrypted private keys in an encrypted wallet..?
by
rterwedo
on 13/11/2017, 05:19:02 UTC
Given we have:

1) a wallet.dat file with ~100 addresses.
2) 40 addresses in the same wallet, with addr, pub keys, encrypted private keys AND unencrypted private keys
3) mkey with: {crypted key, salt, and nDeriveIterations, etc)
4) Anything else we need from pywallet, etc
Is it possible to find the password for the wallet as a whole OR the unencrypted private key for one SPECIFIC address in the wallet file assuming we have the pub key, addr, and encrypted key for that address (along with mkey).

Note these are all addresses in the SAME wallet.dat, encrypted at the same time with same password and we could recover unencrypted private keys for ~40 of them (but not the 1 addr we want).

My assumption is no, because your wallet would be exposed when you spend a coin (if someone who has received coins from you got ahold of your wallet).

That being said, what do you think would be faster, assume pwd is in dictionary list...

1) Trying various passwords from a dictionary and encrypting priv keys in wallet and checking against their known encrypted verion?  (And then knowing pwd for wallet)
2)  Doing same as above, except trying to decrypt against a dictionary and matching to know unencrypted values
3) Using some GPU tool like btcrecover and brute forcing it.  Depending on GPUs etc, you can get 1k pwd / s to 50k pwd/ sec.

I have tried messing around with js bip38 tools etc, but none seem to work atm or I would be timing this.

EDIT: This is different then cracking, as you 1) have the wallet 2) have unencrypted/encrypted private keys in the same wallet.

Thanks