Posts: 17
Threads: 5
Joined: May 2023
05-31-2023, 11:07 AM
(This post was last modified: 05-31-2023, 11:25 AM by amrgdnn.)
ı have old Bitcoin wallet.
and ı use password : 56489 but at the end of password and somewhere between the numbers there are 3 ascii caracters (alt+255 and alt+0160 )
How can I create a mask for it? i tried everything but can't crack hashcat
I wrote the same problem before. I tried all that was said but they didn't work.
Please let an expert explain it to me. Or if anyone can break it, contact me.
I can't break ascii characters
I created a mask for this password like this.
c2ao(tis is alt+255) c5ao (this is alt+0160) those are special space charecter
3536343839c2aoc5ao
c2ao3536343839c5ao
c5ao3536343839c2ao
35c2ao36343839c5ao
3536c2ao343839c5ao
etc...
but non of them crack the password.ı wrote all the masks like this.
I even created a new wallet myself and put a simple password and 2 special characters.
not found again hashcat.
please someone who knows help me
Posts: 111
Threads: 1
Joined: Apr 2023
Can you send sample hash or post it here? (hash:plaintext)
Posts: 111
Threads: 1
Joined: Apr 2023
05-31-2023, 01:51 PM
(This post was last modified: 05-31-2023, 01:53 PM by lapsikmees.)
Example hash:
$bitcoin$64$9b84bbed9b6c71093e1b51ce6425b79bbf14d8a09e06f58d39d36f77c953e550$16$702e5b55f9b7de49$360786$96$da922f0b461a547f0812cffdcc38dc9ee6385083f3fe8636132239c482cfde2da33fa5b008f31f46c5fecbc00af3e93e$66$03ff9c5cb150834c1c3114e1d9b7ed1fe94c1c5dec0e9faca5508f7fe067d06f2f:� 1
Command to bruteforce it: hashcat -a 3 --session=2023-05-31 -m 11300 -w 3 --hex-charset --status --status-timer=60 -p : --outfile-autohex-disable -o crackedhash.txt -1 EFBFBDC2A031 "hashfile.txt" ?1?1?1?1?1?1
Posts: 17
Threads: 5
Joined: May 2023
aikiuslik dateline='[url=tel:1685533905' Wrote: 1685533905[/url]']
Example hash:
$bitcoin$64$9b84bbed9b6c71093e1b51ce6425b79bbf14d8a09e06f58d39d36f77c953e550$16$702e5b55f9b7de49$360786$96$da922f0b461a547f0812cffdcc38dc9ee6385083f3fe8636132239c482cfde2da33fa5b008f31f46c5fecbc00af3e93e$66$03ff9c5cb150834c1c3114e1d9b7ed1fe94c1c5dec0e9faca5508f7fe067d06f2f:� 1
Command to bruteforce it: hashcat -a 3 --session=2023-05-31 -m 11300 -w 3 --hex-charset --status --status-timer=60 -p : --outfile-autohex-disable -o crackedhash.txt -1 EFBFBDC2A031 "hashfile.txt" ?1?1?1?1?1?1
What is the meaning of EFBFBDC2A031 ?
Posts: 111
Threads: 1
Joined: Apr 2023
ALT-0160 is 3 bits HEX EFBFBD
ALT-255 is 2 bits HEX C2A0
5 is 1 bit HEX 35
6 is 1 bit HEX 36
4 is 1 bit HEX 34
8 is 1 bit HEX 38
9 is 1 bit HEX 39
If you say there is 3 special spaces in password, mask would be ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
On planet Earth there aren't computer that could crack that, atleast not to my knowledge.
Maybe if you do wordlist, hashcat automatically converts special characters to hex.
Posts: 111
Threads: 1
Joined: Apr 2023
Posts: 111
Threads: 1
Joined: Apr 2023
Sorry
ALT-255 is 3 bits EFBFBD
ALT-0160 is 2 bits C2A0
(05-31-2023, 02:15 PM)aikiuslik Wrote: ALT-0160 is 3 bits HEX EFBFBD
ALT-255 is 2 bits HEX C2A0
5 is 1 bit HEX 35
6 is 1 bit HEX 36
4 is 1 bit HEX 34
8 is 1 bit HEX 38
9 is 1 bit HEX 39
If you say there is 3 special spaces in password, mask would be ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
On planet Earth there aren't computer that could crack that, atleast not to my knowledge.
Maybe if you do wordlist, hashcat automatically converts special characters to hex.
Posts: 17
Threads: 5
Joined: May 2023
aikiuslik dateline='[url=tel:1685537583' Wrote: 1685537583[/url]']
Sorry
ALT-255 is 3 bits EFBFBD
ALT-0160 is 2 bits C2A0
aikiuslik dateline='[url=tel:1685535317' Wrote: 1685535317[/url]']
ALT-0160 is 3 bits HEX EFBFBD
ALT-255 is 2 bits HEX C2A0
5 is 1 bit HEX 35
6 is 1 bit HEX 36
4 is 1 bit HEX 34
8 is 1 bit HEX 38
9 is 1 bit HEX 39
If you say there is 3 special spaces in password, mask would be ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
On planet Earth there aren't computer that could crack that, atleast not to my knowledge.
Maybe if you do wordlist, hashcat automatically converts special characters to hex.
HashCat does not recognize this character c2ao.
İt dedects it as normal text not hex
Posts: 64
Threads: 1
Joined: Mar 2017
You keep writing "c2ao", you should be writing "c2a0".
"o" is the 15th character of the alphabet, and is not a hexadecimal digit, "0" (zero) is.
(05-31-2023, 08:16 PM)amrgdnn Wrote: aikiuslik dateline='[url=tel:1685537583' Wrote: 1685537583[/url]']
Sorry
ALT-255 is 3 bits EFBFBD
ALT-0160 is 2 bits C2A0
aikiuslik dateline='[url=tel:1685535317' Wrote: 1685535317[/url]']
ALT-0160 is 3 bits HEX EFBFBD
ALT-255 is 2 bits HEX C2A0
5 is 1 bit HEX 35
6 is 1 bit HEX 36
4 is 1 bit HEX 34
8 is 1 bit HEX 38
9 is 1 bit HEX 39
If you say there is 3 special spaces in password, mask would be ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
On planet Earth there aren't computer that could crack that, atleast not to my knowledge.
Maybe if you do wordlist, hashcat automatically converts special characters to hex.
HashCat does not recognize this character c2ao.
İt dedects it as normal text not hex
Posts: 111
Threads: 1
Joined: Apr 2023
Let's say your password contain those hex-ses
3536343839C2A0C5A0
Then mask ?1?1?1?1?1?1?1?1?1 - seven characters
?1?1?1?1?1?1?1?1?1?1?1 - eight characters
?1?1?1?1?1?1?1?1?1?1?1?1?1 - nine characters
Cracking bitcoin hash with those mask would take long time. I would do a wordlist and use hashcat rules for that.