An open source Bitcoin wallet password and seed recovery tool designed for the case where you already know most of your password/seed, but need assistance in trying different possible combinations.
I'm trying to understand and decrypt BCVault backup files, any help would be appreciated.
I purchased a new device, so i could test it. The chip is an Atmel ATSAM4SD32B (arm cortex m4 little endian).
So i created some btc and eth wallets for testing purposes, then we got backup file '1'.
After it, i minded to create another btc wallet and backup (file 2), and one more btc wallet (file 3).
By comparing files 1 and 2, you can see that differences start by 0x601 and 0x700 address.
Files 1 and 3 difference starts from 0x601 until 0x800.
After that, i reseted it and so i created a new backup (file 0).
My global password is 1234, and my global pin is 2341 (up, right, down, left).
I created all wallets with password 1234 and pins 1234, 2341, 3412 and 4123.
I do exported raw binary from 2 wallets, which private keys are:
6265327CB72B80F368FA736D3ED10A11B4D039432B3D558070144F20E00D76A41
(these one i think is at memory address 0x601)
and
66EAB4D971D5614509D44C9689CF5ADCAAE472F35D1E428BB5C5FF272F37C923C
(address memory 0x701)
I think they are AES-256 encoded in CBC mode, with these pin and pass forming the key in a way i don't know.
How can i decrypt the wallet from the backup file? Which command or script to use?
I'm trying to understand and decrypt BCVault backup files, any help would be appreciated.
I purchased a new device, so i could test it. The chip is an Atmel ATSAM4SD32B (arm cortex m4 little endian). So i created some btc and eth wallets for testing purposes, then we got backup file '1'. After it, i minded to create another btc wallet and backup (file 2), and one more btc wallet (file 3).
By comparing files 1 and 2, you can see that differences start by 0x601 and 0x700 address. Files 1 and 3 difference starts from 0x601 until 0x800.
After that, i reseted it and so i created a new backup (file 0).
My global password is 1234, and my global pin is 2341 (up, right, down, left). I created all wallets with password 1234 and pins 1234, 2341, 3412 and 4123.
I do exported raw binary from 2 wallets, which private keys are: 6265327CB72B80F368FA736D3ED10A11B4D039432B3D558070144F20E00D76A41 (these one i think is at memory address 0x601)
and 66EAB4D971D5614509D44C9689CF5ADCAAE472F35D1E428BB5C5FF272F37C923C (address memory 0x701)
I think they are AES-256 encoded in CBC mode, with these pin and pass forming the key in a way i don't know. How can i decrypt the wallet from the backup file? Which command or script to use?
Backup Files Folder