Hi everyone,
First post, first crack project, although have already spent quite some time of this so should be able to skip to the chase:
First post, first crack project, although have already spent quite some time of this so should be able to skip to the chase:
- Dash coin / bitcoin-core wallet.dat hash crack
- Hash already extracted, so using mode 11300 with Hashcat
- Most likely password form represented as mask Code:
?u,?l,?d,?1?2?3?2?3?2?2?2?2
- This is, unfortunately, 9 characters, so starts to enter the zone of unfeasibility...
- Previous attack phase was based around typo options using btcrecover, no luck
- Next phase is a Hashcat mask attack on AWS using p3.2xlarge (at first, at least)
- This mask gives us a total combinations of Code:
803,181,017,600
- p3.2xlarge gives us a hash rate of Code:
19,485 H/s
- This works out at worst-case performance of Code:
803181017600 / 19485 / 60 / 60 = 11,450.132831 hours = 1.3 years
- That also results in a worst-case cost of (on-demand instances)Code:
~12,000 * $3.06 = ~$36,0000
- As far as I can see with AWS, prices scales basically linearly with the P3 types, so it's only possible to buy time this way (total cost is equivalent)
- The amount in the wallet is large, but not astronomical. It still justifies a fairly decent investment at this stage, although $36,000 is not justifiable
- Currently the only possible adjustment would be to bid for spot instances on AWS. The marketing claims we could save 90%, which would bring the brute-force down to a tolerable cost of ~$4,000
- However, it seems like this would add a lot of complication, since we would need to script the cracking run to work on-demand (instead of running constantly). This is certainly do-able, just requires a fair bit of margin of error, unless I'm misunderstanding how spot instances work
- We already tried to request a p3.16xlarge, but were denied it for the time being. p3.16xlarge on spot instance pricing seems like it might be worthwhile, although I haven't done the calculations