Status: Exhausted Bitcoin Wallet Passphrase Recovery
#1
HI,

I tried following command, It started cracking Bitcoin Wallet Passphrase and status came: Exhausted

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a

I tried on 2 different wallets and got the same result.

This what came up in orange when started in CMD;

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.

Cracking performance lower than expected?

* Append -w 3 to the commandline.
  This can cause your screen to lag.
* Update your OpenCL runtime / driver the right way:
  https://hashcat.net/faq/wrongdriver
* Create more work items to make use of your parallelization power:
  https://hashcat.net/faq/morework

Driver temperature threshold met on GPU #3. Expect reduced performance.

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$96$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (I removed this)
Time.Started.....: Wed Feb 13 23:42:59 2019 (12 mins, 49 secs)
Time.Estimated...: Wed Feb 13 23:55:48 2019 (0 secs)
Guess.Mask.......: ?a?a?a [3]
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....: 1115 H/s (0.38ms) @ Accel:32 Loops:8 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 857375/857375 (100.00%)
Rejected.........: 0/857375 (0.00%)
Restore.Point....: 9025/9025 (100.00%)
Candidates.#3....: ar -> ~
HWMon.Dev.#3.....: Temp: 82c Fan: 35% Util: 83% Core:1645MHz Mem:3504MHz Bus:16

Started: Wed Feb 13 23:42:40 2019
Stopped: Wed Feb 13 23:55:49 2019

My Operating System Details; Intel® Core™ i7-7700 Processor
8M Cache, up to 4.20 GHz RAM: 16GB

I would like to know what am I doing wrong in here,

Many Thanks
Reply
#2
you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.
Reply
#3
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

You are the Champion.  I will try more.

God Bless you.
Reply
#4
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

Sorry mate I am not so good at this one, now I got following error,

I guessed if the password was 10 to 15 char long I used following command and I got this error



Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?
Reply
#5
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

I you can correct my error with examples and educate me, that will be so helpful
Reply
#6
(02-14-2019, 12:11 AM)suhel1986 Wrote:
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

I you can correct my error with examples and educate me, that will be so helpful
Reply
#7
(02-14-2019, 12:07 AM)suhel1986 Wrote: Sorry mate I am not so good at this one, now I got following error,

I guessed if the password was 10 to 15 char long I used following command and I got this error



Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

You are trying 10 to 15 char, that is waaaaaayyyyyyyyy too long. You are never gonna get that.

A length of 10 generates a total of 95 (characters in ?a) to the power of 10 possibilities. In total 59873693923837890625 passwords. At your speed of 1115 H/s that will take 1702764467 years.

You can't brute force a Bitcoin Wallet Passphrase letter for letter. You need to use https://hashcat.net/wiki/doku.php?id=dictionary_attack which combines your words in the Passphrase. Only problem there is you need a wordlist which has all the words in the passphrase and isn't too long. otherwise you will run in to the same problem.
Reply
#8
(02-14-2019, 12:07 AM)suhel1986 Wrote:
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

Sorry mate I am not so good at this one, now I got following error,

I guessed if the password was 10 to 15 char long I used following command and I got this error



Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

Our solar system would come to an end before you would crack it with that mask.
I recommend utilizing different method.
Reply
#9
Bitcoin wallet & 15 chars is not doable in a human life.

By the way your problem is the last '?' character, remove it :

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

Finally hashcat-4.1.0 is outdated. Use v5.1.0
Reply
#10
(02-14-2019, 10:38 AM)Jefferson Wrote:
(02-14-2019, 12:07 AM)suhel1986 Wrote:
(02-13-2019, 04:40 PM)DanielG Wrote: you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none were the correct password.

Sorry mate I am not so good at this one, now I got following error,

I guessed if the password was 10 to 15 char long I used following command and I got this error



Integer overflow detected in keyspace of mask: ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?

Our solar system would come to an end before you would crack it with that mask.
I recommend utilizing different method.

Does that mean using Hashcat's Brut Force is Impossible on Bitcoin,

Because this is the minimum estimated time:

C:\Users\wq\Desktop\hashcat-4.1.0>hashcat64.exe -a 3 -m 11300 wallethash.txt ?l?l?l?l?l?l?l

Session..........: hashcat
Status...........: Running
Hash.Type........: Bitcoin/Litecoin wallet.dat
Hash.Target......: $bitcoin$64$2ecb6691460c19de44584d2b22d201597874ec4...c6a926
Time.Started.....: Fri Feb 15 01:31:49 2019 (2 mins, 7 secs)
Time.Estimated...: Wed Apr 10 07:04:58 2019 (54 days, 6 hours)
Guess.Mask.......: ?l?l?l?l?l?l?l [7]
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....:     1713 H/s (6.04ms) @ Accel:32 Loops:8 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 163840/8031810176 (0.00%)
Rejected.........: 0/163840 (0.00%)
Restore.Point....: 0/308915776 (0.00%)
Candidates.#3....: marieri -> mcksusa
HWMon.Dev.#3.....: Temp: 73c Fan: 33% Util: 37% Core:1657MHz Mem:3504MHz Bus:16
Reply