Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEo4CeM6z4--sHW6pAwaRS=zxrrU6d=gY7RQon04QzQoNCjEFA@mail.gmail.com>
Date: Sat, 10 Oct 2020 20:48:31 +0200
From: Albert Veli <albert.veli@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: how bitcoin2john works

On Sat, Oct 10, 2020 at 6:47 PM Jack Anderson <jakrson@...mail.com> wrote:

> I want to understand and more information on how to execute it, I want to know how the output hash is reached by file analysis and calculation.

Well first run bitcoin2john and redirect the output to a new file.
Then start john, give the hash file as argument and specify the attack
mode. You might want to start with a wordlist attack using for
instance the rockyou.txt wordlist. That is a good starting point.

I don't know how the hash is extracted from wallet.dat, but I guess
that wallet.dat is password protected and it is this password that can
be cracked with john. In general most hash formats work like this with
john:

1. A candidate password is calculated by john
2. The candidate is run through the relevant format algorithm and a
hash is calculated
3. Compare the calculated hash with the relevant hash(es) in the hash file

Then loop back to 1 and calculate another password candidate. Your
attack specifies how the candidates are calculated. There are many
different ways to calculate candidate passwords, "attacks". See the
doc folder for more information. The wordlist attack is the most
basic, it just tries each word in the list.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.