ryancdotorg / brainflayer

A proof-of-concept cracker for cryptocurrency brainwallets and other low entropy key algorithms.
https://rya.nc/brainflayer
909 stars 459 forks source link

I can't check it #147

Open Bogomexp opened 3 years ago

Bogomexp commented 3 years ago

Hi, I wanted to test the program and added a passphrase "password". 16ga2uqnF1NqpAuQeeg7sTCAdtDUwDyJav(uncomressed) and 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue(compressed) translated to .hex and made bloom filter. But the brainflayer didn't find a match, what did I do wrong?

IKramsaev commented 3 years ago

hello

add hash160 to the.hex file and then it will find

IKramsaev commented 3 years ago

image

/

Bogomexp commented 3 years ago

image

/

16ga2uqnF1NqpAuQeeg7sTCAdtDUwDyJav It is 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 or 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 ?? Give PLS valid converter

Bogomexp commented 3 years ago

it worked! I used 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 instead of 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 But I can't find a converter(base to hex) for the big .txt files.

uzvervolf commented 3 years ago

I have a same problem, HELP!!! adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA i tried hashes 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 cc269b6094fff835a20b96d688912edcb49daae4 I saved these hashes with a text editor to hexbtc.hex and then run ./hex2blf hexbtc.hex hexbtc.blf Then I ran ./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt. The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s "" Could it be wrong hashes? Maybe the problem is in the bloom filter? Maybe my sequence of actions is wrong? Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G) 1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 and passphrase "password" in words.txt from this topic - and it doesn't work again

Bogomexp commented 3 years ago

I have a same problem, HELP!!! adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA i tried hashes 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 cc269b6094fff835a20b96d688912edcb49daae4 I saved these hashes with a text editor to hexbtc.hex and then run ./hex2blf hexbtc.hex hexbtc.blf Then I ran ./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt. The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s "" Could it be wrong hashes? Maybe the problem is in the bloom filter? Maybe my sequence of actions is wrong? Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G) 1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 and passphrase "password" in words.txt from this topic - and it doesn't work again

check in what format words.txt must be UTF-8 Unix(LF)!

Bogomexp commented 3 years ago

"depart bridge doll keen kid winter bus option thank tank expect grief" hex - 42ccb7ce0e7eb16608442ccc7b9ba4b94668831a

"password" hex - 3e546d0acc0de5aa3d66d7a920900ecbc66c2031

I have a same problem, HELP!!! adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA i tried hashes 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 cc269b6094fff835a20b96d688912edcb49daae4 I saved these hashes with a text editor to hexbtc.hex and then run ./hex2blf hexbtc.hex hexbtc.blf Then I ran ./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt. The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s "" Could it be wrong hashes? Maybe the problem is in the bloom filter? Maybe my sequence of actions is wrong? Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G) 1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825 2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 and passphrase "password" in words.txt from this topic - and it doesn't work again

"depart bridge doll keen kid winter bus option thank tank expect grief" hex - 42ccb7ce0e7eb16608442ccc7b9ba4b94668831a

"password" hex - 3e546d0acc0de5aa3d66d7a920900ecbc66c2031