Online blockchain

blockchain technology

How To Recover Your Bitcoin Wallet Password

This guide will also work for most crypto-currency wallet password recovery.

This guide is designed to work for you and will take you every step of the way

in Do It Yourself Password Recovery, but it often takes multiple,

powerful CPU processors to efficiently recover a password.

If you don’t want to do it yourself, Go Bit Go offers a full password recovery service using

You can always try it yourself, and if you decide you need professional recovery, we can help.

Once upon a time, your bitcoin wallet wasn’t worth much but that once low valued wallet is now worth how much? Thousands? Millions? A new life – free of monetary struggles? That’s great news! The bad news is &ndash, you lost or forgot your password! Hey, it happens but unlike your favorite website (possibly GoBitGo.com?), there is no ",I forgot my password", option. What do you do when your bitcoin fortune is so close yet so far, and the only thing that separates you from that fortune is a few digits? That’s where this DIY (Decrypt It Yourself) guide comes in!

BE WARNED: While this guide is likely your best bet in recovering your wallet, it will not work for everyone due to the following requirements:

  1. Having the required knowledge and understanding to complete the process described below.
  2. Your computer hardware may not be fast enough to decode your password in any reasonable amount of time.
  3. There are potentially infinite variations of passwords. Your password may be lost forever or at least until computer hardware is faster

Below, I am going to focus on bitcoin but the process should be the same for all crypto currency password, since they are all based on bitcoin. Anywhere I say bitcoin, substitute your desired coin!

Requirements

  1. The latest copy of your bitcoin wallet file (wallet.dat):

Your wallet is stored on your computer located in different locations based on your operating system – you can google it for more information. You should also be making backup copies of this wallet file, but you must use the latest copy. If you are using a copy of the wallet and you have updated your password after the latest copy, this will not work due to the wallet keys being changed.

  • Good idea of what the password is:
  • Hopefully, you know what the password should have been but maybe you are one character off or the capitalization is off. These common mistakes are the most likely reason that you are locked out of your wallet. If you have no idea of what the password is, the wallet would need to be ",brute forced", cracked which is currently not an option for bitcoin wallets. Read more below why brute force will not work

  • Basic understanding of Linux:
  • While this guide should get you going, you may come across problems along the way. Remember, google is your friend when trying to understand the problem and figuring out a solution.

  • Computer(duh)
  • You will need a computer to run the program – the faster cpu (with as many cores as possible), the better!

  • list of potential passwords
  • You will need to generate a list of potential password phrases based on your best guess for your password (covered in step 7)

  • Time. and. Patience
  • You should be up and going pretty quickly but depending on your assumed password, it can take days, weeks, months, years and so on to recover your password. The longer you can devote your PC to attempting the recovery, the quicker it will happen. If it ever does.

    Initial Questions and Answers You May Have

    • Question: I got fifty GPUs in my basement that can churn over a million passwords a second! How come I can’t use them?

    Answer: Due to how bitcoin wallets are encrypted, GPU’s currently can’t crack the wallets. When you are using your GPU’s for mining, it is for calculating SHA256 or SCRYPT hashes. These are programs created specifically for mining work and solely for these algorithms in a reverse order &ndash, this not what is used for the wallet encryption. Here is the information directly from the ",Technical details of wallet encryption:",

    Wallet encryption uses AES-256-CBC to encrypt only the private keys that are held in a wallet. The keys are encrypted with a master key which is entirely random. This master key is then encrypted with AES-256-CBC with a key derived from the passphrase using SHA512 and OpenSSL’s EVP_BytesToKey and a dynamic number of rounds determined by the speed of the machine which does the initial encryption (and is updated based on the speed of a computer which does a subsequent passphrase change). Although the underlying code supports multiple encrypted copies of the same master key (and thus multiple passphrases) the client does not yet have a method to add additional passphrases.

    Basically, it’s double encrypted and the faster the computer, the higher the encryption strength.

  • Question: How about brute forcing the password?
  • Answer: To brute force, you need to be able to do millions of attempts per second. This is currently impossible for the bitcoin wallet. On average, you will be somewhere at 10-13 attempts per second per cpu core – this will vary depending on the performance of the computer the wallet was encrypted on versus the computer(s) trying to decrypt the wallet.. Read the last question and answer for more information about wallet encryption.

  • Question: Ahhh. I don’t have any idea what my password is. There has to be something I can do.
  • Answer: Well. It’s not looking good for you. This is what you can do

    1) Save your wallet file and eventually there MAY be systems fast enough to brute force passwords. This is many, many, many years down the line. You will likely be a very rich person with absolutely no access to your funds.

    2) Keep a pen and paper next to you at all times! Write down every possible combination you think it may be. Who knows, it may one day come back. You can also use this guide to help with the potential passwords.

  • Question: I do not have a copy of my wallet file. Not a big deal, right?
  • Answer: Ohhh. You’re not going to like this. Your coins are gone forever and ever and. Sorry. Maybe start mining again. Who knows how much one coin may be worth in the future.

    So, exactly what are we going to do?

    You are going to install a linux OS distribution, in order install and run a cracking program called John The Ripper. It is a very popular program for password cracking due to it’s performance and configuration options! Along the way, you will install all dependencies and modify the configuration of the program. You will go over the basic use of the program from start to finish. We will also talk about password list options – this is an important part of the process!

    The computer you install it on will need to be running as long as possible. For many, this means you may not have access to your computer for quite some time. You will be able to pause and resume the program at any time.

    Virtual or dedicated computer

    In this guide, I am going to install the above mentioned software in a virtual environment using a program called Oracle VM VirtualBox. You can use this program or you can use your dedicated computer. Let’s go over the pros and cons of each option.

    The below instructions should be the same on every computer since oracle VM will replicate the same hardware on every ones computer.

    You will have full access to your desktop environment at any time. Granted, while the program is running your computer will perform slower but you can easily pause or resume it at any time.

    The cracking software should technically run a little bit faster since your computer does not need to use resources to emulate the secondary operating system.

    May run a little slower than the dedicated system

    The below instructions may be a bit different due to the fact different hardware may require additional driver installation

    It will need to either run the Linux environment off a flash drive, partition your hard drive and modify the boot sector or install an additional hard drive specifically for linux.

    You will need to decide if you want to go virtual or dedicated but in this article, we will be setting up a virtual environment. The instructions will however be very similar along the way!

    Alternative approach

    An alternative approach would be using a simple script to attempt to verify the passphrase against the bitcoin client, however there would be no control for pausing the program nor multi-core support.

    Step 1) Gather The Required Files

    This step is for people using the virtual environment option – The first thing we need to do is download and install the virtual environment program called Oracle VM VirtualBox. Go to https://www.virtualbox.org/wiki/Downloads download and save the latest virtualbox version for your operating system. At the time of this writing the latest version is 4.3.6.

    Proceed to install VirtualBox by running the downloaded file. Use all default install options.

    We will now need to download our Linux distro ISO file. In this guide, we will be using Debian 7 (if you like ubuntu, the install process should almost be identical.) Go to http://www.debian.org/distrib/netinst and under Small CD’s option, download the i386 ISO file. For this guide we will use the i386 version (AKA 32 bit) since everyone can run it but if you want a 64 bit virtual environment (not needed), download the amd64 ISO file. At the time of this writing, the file I downloaded is named ",debian-7.3.0-i386-netinst.iso",.

    NOTE: Depending you your CPU, you may be able to run a 32 bit os and a 64 bit virtual environment.

    If you are going to run Linux directly from a hard drive, you will not need Virtualbox. You will instead need to install linux to a hard drive. BE WARNED: You do not want to install linux over your current OS. It could damage your boot sector or format your entire hard drive. Please do so only if you know how – or follow another guide online!

    Step 2) Create The Virtual Environment

    The initial welcome screen and the first step of creating your virtual environment.

    Now that you have installed VirtualBox and have downloaded the proper ISO, open the VirtualBox program and you will be greeted with a welcome screen. Proceed to click on the ",New", icon and you will be prompted with some basic questions. Enter the information below:

    (you can really enter anything here)

  • Type: Linux
  • Version: Debian
  • Click Next To Proceed
    • You will be prompted to enter a memory amount for your virtual machine.

    For Memory size, enter 512MB to 1000MB – you really will not need more than this.

    Click Next To Proceed
    • You will now be prompted to create a vitrual hard drive.

    Select ",Create a virtual hard drive now.",

    You will specify the drive size later on.

    Click Next To Proceed
    • You will now be prompted to select your hdd file type.

    VDI is fine for this. You can also VHD.

    Click Next To Proceed
    • You will now be prompted on storage type.

    You can choose either Dynamically allocated or fixed size.

    Click Next To Proceed
    • You can now select your virtual drive size.

    10GB should be enough unless you have a huge password list.

    You can make it larger but I would not suggest going smaller.

    Click Next To Proceed

    Congratulations, you created your virtual environment! Now we need to install Debian on it.

    Step 3) Adjust the Virtual Environment In Preparation For Install

    3.1 – VirtualBox Configuration

    This is what you should see after creting the virtual enviroment

    Now, let’s install Debian and tweak our virtual environment. To show the settings for your virtual environment, make sure ",Debian Cracker", is selected on the left (it will be blue when selected.) Next, click on ",Settings.", You will now see a list of settings for your environment. We will go through the needed options one at a time.

    Let’s start with the General Settings

    3.2 – VirtualBox Copy and Paste Config

    Click on advanced and change the settings for Shared Clipboard and Drag n’ Drop to Bidirectional. This will allow you to copy and paste text and files from your os to the virtual environment and vice versa – making the process much easier!

    System Settings

    3.3 – VirtualBox Select Processor Count

    There are quite a few options here but the one we are interested in is the processor count. Select how many processors you want to use in the virtual environment. The more you give, the faster it can go! You can also choose to lower the Execution Cap. What this can do is give the environment a specified percentage of each CPU core. If you set to 80, your primary OS will have 20% from each core left over. You would need to experiment to see if it’s better to use less CPU’s and give 100% execution or all cores and reduce the execution percentage. For this guide, I am going to give it full power!

    Under the motherboard tab, you can modify how much memory to give the environment as well. We’re going to leave it as-is for now since we specified our memory value during the environment setup (step 2.)

    Quick TIP: Hyperthreaded cores count! That four core CPU with Hyperthreading can be set as 8 cores.

    3.4 – VirtualBox Mount Install ISO

    Now, we need to use a virtual CD/DVD drive and mount our Debian distro ISO. Under the storage settings, click on the ",CD Empty", icon under Controller: IDE – the one next to the arrow. You will now see attributes on the right come available and click on the ",CD", icon circled in the above diagram. From the newly visible dropdown, select ",Choose a virtual CD/DVD disk file.", You will now need to locate the downloaded ISO file – if you did not select the folder during download, it is likely under your Downloads folder. Double click on the ISO file. You should now be returned to the storage settings section and under information to the right (in the purple rectangle above), it will list the ISO file details.

    That should do it! Press OK, and let’s continue.

    Step 4) Install Debian in the virtual environment

    4.1 – Initall Debian Install

    From the screenshot above, you will notice that in the circled section, the mounted ISO file is listed there. You may also notice that your processor count now represents what you selected in the last step.

    QUICK TIP: If at any time you are not able to manipualte your primary OS, your mouse and key strokes are likely being captured by the virtual environment . To stop the virtual environment from capturing your inputs, simply press the Right CTRL button and the keyboard and mouse will be released. Right CTRL is the default key. You can change it later on.

    4.2 – Debian Install Options

    Now, click on the green ",Start", arrow. In a few moments you will be prompted with a Debian options screen. So far, so good! Select Graphical Install and press the enter key.

    4.3 – Debian Install Select Language

    Select your preferred language followed by your location and keyboard configuration and press ",Continue", on each step.

    4.4 – Debian Install Add Hostname

    The install will run for a few moments and you will be prompted for a host name. You can enter pretty much anything you want. For this guide, I’m going to call it GoBitGo – press ",Continue",. Next, under Configure the network, leave it blank and ",Continue",.

    4.5 – Debian Install Select Root Password

    I am personally going to leave the root password empty. This will make the default user the ",root", user. This environment is not meant to be used all the time and not even online, so I would not worry too much about security. If you want to enter a password, go for it. Just try to remember this one. Just kiddin’.

    NOTE: Those of you that are not familar with linux will not know what ",root", is. The ",root", user is like the administrator that has full access to the system and is able to run all commands.

    NOTE: If you do enter a password, you may sometimes need to enter ",sudo", before some commands. The ",sudo", command runs a command as the super user.

    4.6 – Debian Install User Account Setup

    Enter a username for your account. I just entered ",cracker",. Click ",Continue", and you will then be prompted for a password for the user. I used cracker. So my username is cracker and my password is cracker.

    Next, you will be asked your time-zone for clock configuration. It is suggest to enter the right time-zone.

    4.7 – Debian Install Disk Partition Setup

    Next, you will be prompted to select a partiton setting. Just use the first option – ",Guided – use entire disk", and press ",Continue",. The next screen will show your virtual hard drive – press ",Continue",. It will then ask how to partiton the drive. Use the first setting – ",All files in one partition", and press ",Continue",.

    4.8 – Debian Install Disk Partition Setup Step 2

    You will then be shown an overview of your partition settings. Press ",Continue",.

    4.9 – Debian Install Confirm Disk Partition Setup

    You will then be asked to confirm the partition. Select yes and press ",Continue",.

    The virtual hard drive will now be setup and Debian will continue the installation in a few moments.

    4.10 – Debian Install Configure Package Manage Step 1

    You will then be asked to confirm your location for the install in order to find the closest download mirror from you. Select your location and press ",Continue", and on the next screen, select a mirror location – the first option is fine (likely ftp.us.debian.org.) and press ",Continue",. Lastly you will be asked for proxy information. If you have a proxy, enter it, otherwise, leave blank. (if your primary os network connection is setup to use a proxy, the virtual environment will automatically use it).

    During this setup process, the installation will automatically grab the latest file versions from the internet. The process will take some time to complete.

    4.11 – Debian Install Configure Popularity Contest

    You will then be asked to enable ",popularity-contents",. It’s your choice but I would suggest ",No",. Press ",Continue",

    4.12 – Debian Install Configure Package Manage Step 2

    Under ",Software selection,", only select ",Debian desktop environment", and Standard system utilities. Press ",Continue",. The install will run for some time.

    4.13 – Debian Install Select GRUB Loader

    You will now be asked to confirm that you want to install GRUB boot loader. Select ",Yes", and press ",Continue",.

    4.2 – Debian Install Unmount Virtual Drive

    The install process is now complete! Before you continue, you need to eject/unmount the virtual disc drive containing the ISO file. This should be done automatically but it may not have been. To confirm that the ISO is unmounted, right click on the circled icon shown in the above image – if remove disk from virtual drive is greyed out, you are good to go. Otherwhise, click that option and the disc icon will be greyed out. Proceed to press ",Continue",.

    The virtual computer will now reboot. Be patient and wait for a login screen. Upon the bootup screen, the correct installation will boot automatically!

    If this is all too much for you, we offer a Powerful Password Recovery Service.

    Step 5) Install All Dependencies

    5.1 Login To Your Virtaul Envirment

    Now that Debian is installed and running, every time the virtual OS starts, you will be prompted to login. Simply click on your username and enter the password you entered during the installation process. For me, the username is cracker and the password is cracker.

    5.2 Welcome To Your Virtaul Envirment

    Welcome to your workspace. Unfortuntely, we will not be spending much time here. Let’s open a Root Terminal. Click on Applications->,hover over Accessories and click on Root Terminal. You will be prompted for a password. If you entered a root password from the inital install, enter that here. Otherwhise your root password will be the same as the user password that you just used to login.

    5.3 Install Guest Additions

    First thing we need to do is install VirtualBox ",Guest Extensions", software. To do so, click on Devices->,Insert Guest Additions CD Image. You then may be prompted with a confirm screen. Select ",Run", – ignore any errors.

    With the root terminal open, type:

    apt-get -y install apt-get install linux-headers-$(uname -r)

    If asked to confirm, enter Yes.

    Now proceed to restart the virtual box by clicking on the username in the upper right corner – in the image above, the username is ",cracker",. Go to shutdown and restart. You should now be able to copy and paste text back and forth from your primary OS and the virtual environment .

    QUICK TIP: If you still can not copy and paste and you don’t want to re-type all the commands below, open this page in your virtual environment by going to Applications->,Internet->,IceWeasel and enter the url FULL URL. You can then copy (ctrl+c or right click and copy) and paste it into the terminal (right click and paste – ctrl+v will not work in terminal).

    5.4 Install Dependicies

    Once the virtual environment comes back online and you login, open a terminal as root (same as step 5.2)

    With the root terminal open, type:

    apt-get -y install build-essential gcc++ libssl-dev ruby git

    With the required packages installed, let’s grab and compile John The Ripper.

    First let’s look at what directory you are in. With the above example, I am at ",/home/cracker",. This is good. after /home/ is the username you entered during the inital install. You will want to be in your /home/USERNAME folder before executing your next step. If you have only entered what was typed in this guide you should be there.

    5.5 Download John The Ripper

    Execute the following command:

    git clone -b bleeding-jumbo git://github.com/magnumripper/JohnTheRipper JohnTheRipper

    This code will make a copy of the current John The Ripper release using all updates (as of 12-24-2013). Execute the following code and we will begin compiling John The Ripper.

    5.6 Configuration For Your Virtual Environment For Multiple Cores

    If you are only using one core for John The Ripper, you can skip this step but for most, this is important!

    Before we complile John The Ripper, we need to make some changes to the configuration. Enter the following command to edit the configuration file:

    After this command, you should see the above screen. This is the instructions for how to build John The Ripper. Before we proceed, you need to be careful to only modify the following settings unless of course you know what you are doing.

    NOTE: nano is a linux based text editor. It’s nothing like word. Think notepad but without the use of a mouse.The purple circle in the above example shows where your cursor currently is. To navigate the file, you will use the arrow keys. You will want to use the down arrow key to get to the correct line and make the below changes.

    Scroll down the file (using the down arrow) until you get to the line that says. With version downloaded on 12-26-13, it is line 35.

    Simply remove the pound symbol in front of the line so it reads – to do this, simply place your cursor on the pound symbol and press the delete key once.

    Go down two lines and change

    #OMPFLAGS = -fopenmp -msse2

    To – again just remove the pound symbol

    OMPFLAGS = -fopenmp -msse2

    We now need to save and close the configuration file. To do so, press ",CTRL+x", followed by ",y", and finally enter. You should now be returned to the terminal prompt.

    5.7 Build (install) John The Ripper

    Enter the following command and you should see the above screen:

    Now enter the following command

    make clean linux-x86-native

    This program will run for a while

    5.8 – Test John The Ripper

    Now, let’s test John The Ripper

    ../run/john -test –format=bitcoin

    If successful, you will have something like the image above. The area in the purple square shows a successful test of John The Ripper. It was able to process 12.2 attempts per second – Go Speed Racer! Like I said, it’s a very slow process. The inital test however only used one CPU core so if you have multiple cores, you can multiply the text number by core count. Also remember, depending on the speed of the computer on which the wallet was originally encrypted, the faster or slower the decryption process.

    Step 6) Let’s Crack A Wallet!

    Quick guide on how to use John The Ripper

    John The Ripper is extremely configurable. In this guide, we are going to look at just the basics to get you going.

    In the list below, every location that says ",cracker", is the usernamed used in the inital setup (part 2). If you used a different username to setup Debian, replace that name with cracker.

    For example, if my username was ",hermit",, ",/home/cracker/JohnTheRipper/run/john", would be ",/home/hermit/JohnTheRipper/run/john",

    To start John The Ripper

    /home/cracker/JohnTheRipper/run/john /home/cracker/wallet.hash –format=bitcoin –wordlist=/home/cracker/wordlist.txt –fork=n

    Let’s break this down before we continue. In the above line, we are calling John The Ripper and giving four options to utilize. Please also notice the space between each option.

    • Calling John The Ripper: /home/cracker/JohnTheRipper/run/john
    • Specifying the hash to crack (the wallet key): /home/cracker/wallet.hash
    • Telling John The Ripper what we are cracking: –format=bitcoin
    • Giving John The Ripper a wordlist to use: –wordlist=/home/cracker/wordlist.txt
    • Telling John The Ripper how many CPU cores to use (the n is how many cores to use – must be a number): –fork=n
    To resume John The Ripper
    To see a list of cracked passwords

    /home/cracker/JohnTheRipper/run/john –show /home/cracker/wallet.hash

    To view the current status of John The Ripper if running in background
    To view the current status of John The Ripper if actively running in terminal

    Simply press any key except ",q", or ",CTRL+c",.

    To quit John The Ripper and resume at a later time

    While John The Ripper is running, press the ",q", key. It will shut down but can be resumed at a later date.

    To extract the ",encrypted hash", from your bitcoin wallet

    /home/cracker/JohnTheRipper/run/bitcoin2john.py /home/cracker/wallet.dat >,/home/cracker/wallet.hash

    In the rest of the guide, we will be using all of these commands to show real world usage.

    Let’s test your cracking skills!

    UH OH. While writing this article, I forgot my new bitcoin wallet address – luckily there are no coins in it but it’s a great example for you to test with. I thought my password was GoBitGo but it’s not. I likely mistyped a character. Can you crack the password?

    This test cracking is an important step. It will confrim that your virtual environment is properly working and has the ability to potentially crack your password. To test this process, you will need a copy of the encrypted wallet and a word list that I generated to find the password. The wordlist is 500,000 passwords long but fear not, the correct answer is between line 25,000 and 30,000 which should not take too long to find – even with one CPU core. This list was created using a double replace method and has over 2,000,000 passwords. I cut it into a quater to make it a smaller download.

    Required Files

    • Bitcoin Wallet – Click here to download (right click and save as)
    • Password word list – Click here to download (right click and save as)

    How to setup John The Ripper

    The below guide will use the files from above to test John The Ripper. When you are ready to crack your own wallet, simply replace the files from this guide with your own.

    The decryption program does not care about your wallet file – what it does care about is your wallet’s private key. There are multiple ways to extract the private key but for this example, we will ask John The Ripper to do so. If you choose to do so another way, you can skip the following step and just place it in an empty document on the virtual environment.

    6.1 – Upload Required Files

    We now need to get the required files into the virtual environment. In previous steps, we setup the environment with ",Guest Additions", which allow us to drag and drop files directly into the virtual environment tas well as supporting copy and paste. Unfortunately, you can not just drag and drop files directly onto the virtual environment desktop (well, you can but you will have to change some settings of Gnome – this is the Linux GUI.) We will need to open the File Manager. To do so, click on Applications->,Accessories->,Files. This will open the file manager. You can then drag and drop your files directly into this file manager.

    Please also make sure you are in the home folder inside the file manager. In the image above, the folder location is in the blue square. If you are not under the home directory, click on ",Home", on the left side of the file manager.

    NOTE: If for some reason you could not drag and drop your files into the file manager and Guest Additions are not working, I would suggest either:

    1. Copying the files to a flash drive, and on top of the virtual environment, click on Devices->,USB Devices and select the USB device containing the files. The virtual environment *should* open a file manager containing the files. You can then drag and drop them into the other file manager window. Be sure to remove your wallet file from the flash drive so you do not have a potentional security issue in the future after it is moved onto the virtual environment.
    2. Email the files to a gmail, hotmail, etc. email address from the computer containing the required files. Then open a web browser from the virtual environment (to open a browser, go to ",Applications->,Internet->,Iceweasel",) and visit your mail provider, login and download your files from your inbox and then remove the email from the inbox and trash folder. Be warned, this is a potentional security risk since your are uploading a wallet file online. You are however unable to access the wallet so neither would anyone else but use your best judgement!
    3. You may use any other way you can think of to get the files in the virtual environment. You can also google your problem and see if anyone has a solution you think may work.
    6.2 – Extract Key From Bitcoin Wallet

    Now that we have the requried files on the virtual environment, we are ready to extract the private key from your wallet file. To do so, in the terminal, enter

    /home/cracker/JohnTheRipper/run/bitcoin2john.py /home/cracker/wallet.dat >,/home/cracker/wallet.hash

    Your wallet key will be saved in the file named wallet hash. If you want to verify this has worked, you can open this file by entering

    It will display the following (from the test wallet – your personal wallet will have a different hash).

    6.3 Let’s Crack The Wallet

    First, let’s go over a checklist:

    • Functional virtual environment – CHECK
    • Working and tested John The Ripper – CHECK
    • Bitcoin Wallet File in virtaul enviorment – CHECK
    • Bitcoin Wallet Key extracted and placed in separate file – CHECK
    • Wordlist to crack the wallet file from – CHECK (later on, we will talk about creating your specific wordlist)

    Let’s start John The Ripper!

    NOTE: In the below line, after ",–fork=",, the number 4 represents how many CPU cores to utilize. Please enter your desired amount but it can not be more than the amount of cores you have on your computer.

    /home/cracker/JohnTheRipper/run/john /home/cracker/wallet.hash –format=bitcoin –wordlist=/home/cracker/wordlist.txt –fork=4

    6.4 Status Overview

    If everything works, you will see the above image. In the purple square, you will see John The Ripper is starting and using 4 cores (AKA nodes). Now, it’s time to be patient.

    If you want to check the status, make sure you have the terminal as the active running application (just click on it) and press any key. You will then be given the information of each CPU core – how fast, how far through the list and current active line from the wordlist. In the above example, you can see we are running 4 CPU cores and the cores are ranging from 12.5 to 14.7 guesses per second. It will not total up the speed for you but in this example, we are attempting 55+ guesses per second which is not bad!

    When John The Ripper finds the password, it will show it. but you need to know what to look for. Above is an example with the found password – I placed it in the purple box for you to see. There you have it! the password is actually GoBktGo and not GoBitGo – silly me. Even after it finds the password, the program will keep running on the other cores until it comes to the same conclusion.

    NOTE: Some of you will notice that other CPU cores will find the password as well and you may be thinking that the program is overlapping on each core but the timing does not work out to that conclusion. What I believe is happening is once the password is found on a core, that core shuts down but the program does not update that the specific line as checked. It’s likely a programming bug but should not interfere with the process.

    If you happen to miss the displayed password, you can retreive the password again by entering:

    /home/cracker/JohnTheRipper/run/john –show /home/cracker/wallet.hash

    Step 7) Generating your own password list

    This is possibly the most important step! Unfortuntely, this is not a one size fits all solution. When we look at password decryption, we ask for the most likley to least likey password canidate and they are often very similar but not close enough for a universal solution. I often find myself creating a custom program creating a unique list of potential passwords to first try.

    With that said, the below program can very well find your password if it was a simple typing error. The program was not created by GoBitGo but rather I found it online here. It has been modified to create a list of potential passwords and place them in a file ready for John The Ripper.

    Go Bit Go offers a customized Password Generation List

    1. You give us a list of possible passwords and we review your list, looking for similarities and potential mistakes.

    We then create a customized program that generates a precise list.

  • Using our Intelligent Replacement System, we create an extended large list based on the information you provide.
  • We provide you with all-inclusive list containing millions upon millions of possibilities based on your possilble password.
  • One time fee: $149.00 (paid in U.S Dollars, Bitcoins or Litecoins)

    We will generate your password list usually within 72 hours.

    If you later hire us to decrypt your password, and we are successful, this amount will be credited back to you.

    Email us at info@gobitgo.com to get started.

    To use this program, first you will need to download it via the above link(WordListGenerator.prog). Once downloaded, place it in your virtual terminals file managers Home folder. It’s the same instructions as to section 6.1

    7.1 Modify Bitcoin Wallet Password List Generator

    You will now need to enter what you thought your pass phrase(s) is. Once uploaded, go to your terminal and enter

    You will see something similar to the above image. On the third line, you will see

    This is the list of what you thought the password could be. You can enter any amount of possibilities here. The formatting needs to however stay the same. Each potential password needs to placed in apostrophes with a comma separating each possibility and no comma at the end. For example, if I thought my password could be BitcoinRules, GoBitGoRules, RulingRules47 or IfIRuledTheWorld, the passphraseList line would be:

    Got it? Good! But what if you think your password may contain an apostrophe? Simply add a back slash behind it. Here is an example of a single potential password and it contains an apostrophe:

    Now that you have entered your potential passwords in the file, it’s time to save the file by pressing ",CTRL+X", followed by ",y", and finally press the enter key. To run the program:

    Wanna see the genereated list? Simply enter

    To exit viewing the wordlist, press ",CTRL+x",

    7.2 How to use generated password list

    If you got this far, you’ve already executed a cracking command. All you need to do is follow step 5 again, except this time, you are not going to upload a wordlist file since you created one on the server.

    Step 8) What do I do once the password is found

    Step 1 – Jump up and down for joy – for a minium of 5 minutes!

    Step 2 – Change your wallet passphrase. Your current wallet can potentially be a security risk. By changing the password, it invalidates the old wallet.

    Step 3 – Figure out a good solution, specific to you, for storing your wallet file and passphrase. You can use a paper wallet, save the passphrase on a flash drive and the wallet on another drive, write down the passphrase and save it somewhere safe. To be honest, you are one of the lucky ones – this will not work for eveyone and you do not want to go through this again!

    Step 4 – This is the most important step of all – DONATE, please pretty please. It took quite a bit of time and energy to create this tutorial. This is also a decryption process that we, and others, charge for. I believe information should be free and dare I say open source! I do also believe that if you have gotten any value from it, that value should be shared.

    • Bitcoin: 1GuVoL7sduJYNiUDjHyETvQxThWJ6zcKn6
    • Litecion: Lb7xUUM6sHc4gFm2CjeZZu2LNzjrHZAemE
    • For other currencies, please contact us!

    Step 9) Well, this didn’t work. Now what?

    Do not give up hope! We have options!

    • GoBitGo does offer professional recovery services for a very fair price. Please visit this page for more information.
    • GoBitGo does offer custom wordlist and large-list generation based on your potential password(s). Please read above at step 7 for more information about this service or email us at info@gobitgo.com
    • Keep a pen and paper with you at all times and keep the idea of your password in the back of your mind. Possibly your subconcious will gift you with the password!
    • Computers are getting faster and faster! Who knows what will be possible in the future with forgotten passwords. Store your old wallet somewhere safe with a list of potential passwords and maybe someday it can be cracked.

    Thank you for reading!

    If this process worked for you, we would love to hear about it! If you got stuck along the way, send an e-mail or enter a comment below.

    Got something nice to say? Enter it below or email it to us! Thank you!

    Do you have something that you would like to say or share?

    Otherwise, complete the simple form below to post your message.

    (Will not be displayed to others)

    (This is what others will see)

    (Will not be displayed to others)

    (Will be used to access your account)

    If you can see the input field below, please do not enter anything in it.

    [kw]Blockchain wallet password recovery[/kw]

    Related video: Blockchain/Bitcoin for beginners 5: Bitcoin wallets, how to transfer bitcoins using BreadWallet iOS



    Leave a Reply

    Your email address will not be published. Required fields are marked *