Solar Designer

Results 703 comments of Solar Designer

@isieditors I did not - I just wanted to make sure we have complete info on this issue for someone else to handle it later.

OK, I've tried this trivial patch: ```diff +++ b/run/blockchain2john.py @@ -42,7 +42,7 @@ if __name__ == '__main__': # hack for version 2.0 and 3.0 wallets try: decoded_data = json.loads(data.decode("utf-8")) -...

Maybe relevant, `btcrecover/btcrpass.py` has this comment: ``` # A bit fragile because it assumes that some specific text is in the first encrypted block, # This was "guid" as of...

OK, this makes it crack the password: ```diff +++ b/src/blockchain_common_plug.c @@ -111,6 +111,10 @@ int blockchain_decrypt(unsigned char *derived_key, unsigned char *data) return 0; } + if (memmem(out, 16, "\"tx_notes\"", 10))...

@isieditors This is a patch that you can apply using the `patch` command, then rebuild from source. I guess this might be tricky for you, if you're not used to...

I've just added this to a milestone, but I didn't look into the actual issue and I expect that only @Fist0urs might contribute anything in this area soon.

> It seems that hashcat's 19700 module is broken and doesn't actually crack real hashes. @kholia Perhaps you should open an issue in @hashcat GitHub, then? I guess @Fist0urs already...

@DanielsBerlin Can you please attach the test wallet right to this issue (click "Attach files ..." at the bottom of the comment edit box) and/or send us a pull request...

@DanielsBerlin I took a quick look at the hash you posted previously and at the Python code in `btcrecover`. This didn't appear to be a trivial enough fix for us...

@DanielsBerlin Occasionally yes, see https://www.openwall.com/services/