How To Recover Your Bitcoin Wallet Password

How To Recover Your Bitcoin Wallet Password

This guide will also work for most crypto-currency wallet password recovery.

This guide is designed to work for you and will take you every step of the way

ter Do It Yourself Password Recovery, but it often takes numerous,

powerful CPU processors to efficiently recover a password.

If you don’t want to do it yourself, Go Bit Go offers a total password recovery service using

You can always attempt it yourself, and if you determine you need professional recovery, wij can help.

Once upon a time, your bitcoin wallet wasn’t worth much but that once low valued wallet is now worth how much? Thousands? Millions? A fresh life – free of monetary fights? That’s excellent news! The bad news is &ndash, you lost or left behind your password! Hey, it happens but unlike your dearest webstek (possibly, there is no ",I left behind my password", option. What do you do when your bitcoin fortune is so close yet so far, and the only thing that separates you from that fortune is a few digits? That’s where this DIY (Decrypt It Yourself) guide comes te!

BE WARNED: While this guide is likely your best bet te recovering your wallet, it will not work for everyone due to the following requirements:

  1. Having the required skill and understanding to accomplish the process described below.
  2. Your rekentuig hardware may not be rapid enough to decode your password te any reasonable amount of time.
  3. There are potentially infinite variations of passwords. Your password may be lost forever or at least until rekentuig hardware is quicker

Below, I am going to concentrate on bitcoin but the process should be the same for all crypto currency password, since they are all based on bitcoin. Anywhere I say bitcoin, substitute your desired coin!


  1. The latest copy of your bitcoin wallet verkeersopstopping (wallet.dat):

Your wallet is stored on your pc located ter different locations based on your operating system – you can google it for more information. You should also be making backup copies of this wallet opstopping, but you voorwaarde use the latest copy. If you are using a copy of the wallet and you have updated your password after the latest copy, this will not work due to the wallet keys being switched.

  • Good idea of what the password is:
  • Hopefully, you know what the password should have bot but maybe you are one character off or the capitalization is off. Thesis common mistakes are the most likely reason that you are locked out of your wallet. If you have no idea of what the password is, the wallet would need to be ",brute compelled", cracked which is presently not an option for bitcoin wallets. Read more below why brute force will not work

  • Basic understanding of Linux:
  • While this guide should get you going, you may come across problems along the way. Reminisce, google is your friend when attempting to understand the problem and figuring out a solution.

  • Laptop(duh)
  • You will need a rekentuig to run the program – the swifter cpu (with spil many cores spil possible), the better!

  • list of potential passwords
  • You will need to generate a list of potential password phrases based on your best guess for your password (covered ter step 7)

  • Time. and. Patience
  • You should be up and going pretty quickly but depending on your assumed password, it can take days, weeks, months, years and so on to recover your password. The longer you can devote your PC to attempting the recovery, the quicker it will toebijten. If it everzwijn does.

    Initial Questions and Answers You May Have

    • Question: I got fifty GPUs te my basement that can churn overheen a million passwords a 2nd! How come I can’t use them?

    Response: Due to how bitcoin wallets are encrypted, GPU’s presently can’t crack the wallets. When you are using your GPU’s for mining, it is for calculating SHA256 or SCRYPT hashes. Thesis are programs created specifically for mining work and solely for thesis algorithms te a switch sides order &ndash, this not what is used for the wallet encryption. Here is the information directly from the ",Technical details of wallet encryption:",

    Wallet encryption uses AES-256-CBC to encrypt only the private keys that are held ter a wallet. The keys are encrypted with a master key which is entirely random. This master key is then encrypted with AES-256-CBC with a key derived from the passphrase using SHA512 and OpenSSL’s EVP_BytesToKey and a dynamic number of rounds determined by the speed of the machine which does the initial encryption (and is updated based on the speed of a rekentuig which does a subsequent passphrase switch). Albeit the underlying code supports numerous encrypted copies of the same master key (and thus numerous passphrases) the client does not yet have a method to add extra passphrases.

    Basically, it’s dual encrypted and the swifter the laptop, the higher the encryption strength.

  • Question: How about brute forcing the password?
  • Response: To brute force, you need to be able to do millions of attempts vanaf 2nd. This is presently unlikely for the bitcoin wallet. On average, you will be somewhere at 10-13 attempts vanaf 2nd vanaf cpu core – this will vary depending on the show of the pc the wallet wasgoed encrypted on versus the laptop(s) attempting to decrypt the wallet.. Read the last question and reaction for more information about wallet encryption.

  • Question: Ahhh. I don’t have any idea what my password is. There has to be something I can do.
  • Response: Well. It’s not looking good for you. This is what you can do

    1) Save your wallet opstopping and eventually there MAY be systems prompt enough to brute force passwords. This is many, many, many years down the line. You will likely be a very rich person with absolutely no access to your funds.

    Two) Keep a schrijfstift and paper next to you at all times! Write down every possible combination you think it may be. Who knows, it may one day come back. You can also use this guide to help with the potential passwords.

  • Question: I do not have a copy of my wallet opstopping. Not a big overeenkomst, right?
  • Response: Ohhh. You’re not going to like this. Your coins are gone forever and everzwijn and. Sorry. Maybe begin mining again. Who knows how much one coin may be worth ter the future.

    So, exactly what are wij going to do?

    You are going to install a linux OS distribution, te order install and run a cracking program called John The Ripper. It is a very popular program for password cracking due to it’s show and configuration options! Along the way, you will install all dependencies and modify the configuration of the program. You will go overheen the basic use of the program from commence to finish. Wij will also talk about password list options – this is an significant part of the process!

    The rekentuig you install it on will need to be running spil long spil possible. For many, this means you may not have access to your rekentuig for fairly some time. You will be able to pause and resume the program at any time.

    Virtual or dedicated rekentuig

    Ter this guide, I am going to install the above mentioned software ter a virtual environment using a program called Oracle VM VirtualBox. You can use this program or you can use your dedicated pc. Let’s go overheen the pros and cons of each option.

    The below instructions should be the same on every rekentuig since oracle VM will replicate the same hardware on every ones pc.

    You will have utter access to your desktop environment at any time. Granted, while the program is running your rekentuig will perform slower but you can lightly pause or resume it at any time.

    The cracking software should technically run a little bit swifter since your rekentuig does not need to use resources to emulate the secondary operating system.

    May run a little slower than the dedicated system

    The below instructions may be a bit different due to the fact different hardware may require extra driver installation

    It will need to either run the Linux environment off a flash drive, partition your hard drive and modify the boot sector or install an extra hard drive specifically for linux.

    You will need to determine if you want to go virtual or dedicated but ter this article, wij will be setting up a virtual environment. The instructions will however be very similar along the way!

    Alternative treatment

    An alternative treatment would be using a ordinary script to attempt to verify the passphrase against the bitcoin client, however there would be no control for pausing the program strafgevangenis multi-core support.

    Step 1) Gather The Required Files

    This step is for people using the virtual environment option – The very first thing wij need to do is download and install the virtual environment program called Oracle VM VirtualBox. Go to download and save the latest virtualbox version for your operating system. At the time of this writing the latest version is Four.Three.6.

    Proceed to install VirtualBox by running the downloaded verkeersopstopping. Use all default install options.

    Wij will now need to download our Linux distro ISO opstopping. Te this guide, wij will be using Debian 7 (if you like ubuntu, the install process should almost be identical.) Go to and under Puny CD’s option, download the i386 ISO verkeersopstopping. For this guide wij will use the i386 version (AKA 32 bit) since everyone can run it but if you want a 64 bit virtual environment (not needed), download the amd64 ISO opstopping. At the time of this writing, the opstopping I downloaded is named ",debian-7.Trio.0-i386-netinst.iso",.

    NOTE: Depending you your CPU, you may be able to run a 32 bit os and a 64 bit virtual environment.

    If you are going to run Linux directly from a hard drive, you will not need Virtualbox. You will instead need to install linux to a hard drive. BE WARNED: You do not want to install linux overheen your current OS. It could harm your boot sector or format your entire hard drive. Please do so only if you know how – or go after another guide online!

    Step Two) Create The Virtual Environment

    The initial welcome screen and the very first step of creating your virtual environment.

    Now that you have installed VirtualBox and have downloaded the decent ISO, open the VirtualBox program and you will be greeted with a welcome screen. Proceed to click on the ",Fresh", icon and you will be prompted with some basic questions. Inject the information below:

    (you can indeed inject anything here)

  • Type: Linux
  • Version: Debian
  • Click Next To Proceed
    • You will be prompted to inject a memory amount for your virtual machine.

    For Memory size, come in 512MB to 1000MB – you truly will not need more than this.

    Click Next To Proceed
    • You will now be prompted to create a vitrual hard drive.

    Select ",Create a virtual hard drive now.",

    You will specify the drive size straks on.

    Click Next To Proceed
    • You will now be prompted to select your hdd verkeersopstopping type.

    VDI is fine for this. You can also VHD.

    Click Next To Proceed
    • You will now be prompted on storage type.

    You can choose either Dynamically allocated or stationary size.

    Click Next To Proceed
    • You can now select your virtual drive size.

    10GB should be enough unless you have a hefty password list.

    You can make it larger but I would not suggest going smaller.

    Click Next To Proceed

    Congratulations, you created your virtual environment! Now wij need to install Debian on it.

    Step Three) Adjust the Virtual Environment Ter Prep For Install

    Trio.1 – VirtualBox Configuration

    This is what you should see after creting the virtual enviroment

    Now, let’s install Debian and tweak our virtual environment. To display the settings for your virtual environment, make sure ",Debian Cracker", is selected on the left (it will be blue when selected.) Next, click on ",Settings.", You will now see a list of settings for your environment. Wij will go through the needed options one at a time.

    Let’s embark with the General Settings

    Trio.Two – VirtualBox Copy and Paste Config

    Click on advanced and switch the settings for Collective Clipboard and Haul n’ Druppel to Bidirectional. This will permit you to copy and paste text and files from your os to the virtual environment and vice versa – making the process much lighter!

    System Settings

    Three.Three – VirtualBox Select Processor Count

    There are fairly a few options here but the one wij are interested te is the processor count. Select how many processors you want to use ter the virtual environment. The more you give, the quicker it can go! You can also choose to lower the Execution Cap. What this can do is give the environment a specified percentage of each CPU core. If you set to 80, your primary OS will have 20% from each core left overheen. You would need to proef to see if it’s better to use less CPU’s and give 100% execution or all cores and reduce the execution percentage. For this guide, I am going to give it utter power!

    Under the motherboard tabulator, you can modify how much memory to give the environment spil well. Wij’re going to leave it as-is for now since wij specified our memory value during the environment setup (step Two.)

    Quick Peak: Hyperthreaded cores count! That four core CPU with Hyperthreading can be set spil 8 cores.

    Three.Four – VirtualBox Climb on Install ISO

    Now, wij need to use a virtual CD/DVD drive and climb on our Debian distro ISO. Under the storage settings, click on the ",CD Empty", icon under Controller: IDE – the one next to the arrow. You will now see attributes on the right come available and click on the ",CD", icon circled ter the above diagram. From the freshly visible dropdown, select ",Choose a virtual CD/DVD disk opstopping.", You will now need to locate the downloaded ISO opstopping – if you did not select the folder during download, it is likely under your Downloads folder. Dual click on the ISO verkeersopstopping. You should now be returned to the storage settings section and under information to the right (te the purple rectangle above), it will list the ISO verkeersopstopping details.

    That should do it! Press OK, and let’s proceed.

    Step Four) Install Debian ter the virtual environment

    Four.1 – Initall Debian Install

    From the screenshot above, you will notice that ter the circled section, the mounted ISO verkeersopstopping is listed there. You may also notice that your processor count now represents what you selected te the last step.

    QUICK Peak: If at any time you are not able to manipualte your primary OS, your mouse and key strokes are likely being captured by the virtual environment . To zekering the virtual environment from capturing your inputs, simply press the Right CTRL button and the keyboard and mouse will be released. Right CTRL is the default key. You can switch it straks on.

    Four.Two – Debian Install Options

    Now, click on the green ",Commence", arrow. Ter a few moments you will be prompted with a Debian options screen. So far, so good! Select Graphical Install and press the inject key.

    Four.Three – Debian Install Select Language

    Select your preferred language followed by your location and keyboard configuration and press ",Proceed", on each step.

    Four.Four – Debian Install Add Hostname

    The install will run for a few moments and you will be prompted for a host name. You can inject pretty much anything you want. For this guide, I’m going to call it GoBitGo – press ",Proceed",. Next, under Configure the network, leave it wit and ",Proceed",.

    Four.Five – Debian Install Select Root Password

    I am personally going to leave the root password empty. This will make the default user the ",root", user. This environment is not meant to be used all the time and not even online, so I would not worry too much about security. If you want to come in a password, go for it. Just attempt to reminisce this one. Just kiddin’.

    NOTE: Those of you that are not familar with linux will not know what ",root", is. The ",root", user is like the administrator that has total access to the system and is able to run all directions.

    NOTE: If you do inject a password, you may sometimes need to come in ",sudo", before some directions. The ",sudo", instruction runs a instruction spil the super user.

    Four.6 – Debian Install User Account Setup

    Come in a username for your account. I just entered ",cracker",. Click ",Proceed", and you will then be prompted for a password for the user. I used cracker. So my username is cracker and my password is cracker.

    Next, you will be asked your time-zone for clock configuration. It is suggest to come in the right time-zone.

    Four.7 – Debian Install Disk Partition Setup

    Next, you will be prompted to select a partiton setting. Just use the very first option – ",Guided – use entire disk", and press ",Proceed",. The next screen will voorstelling your virtual hard drive – press ",Proceed",. It will then ask how to partiton the drive. Use the very first setting – ",All files ter one partition", and press ",Proceed",.

    Four.8 – Debian Install Disk Partition Setup Step Two

    You will then be shown an overview of your partition settings. Press ",Proceed",.

    Four.9 – Debian Install Confirm Disk Partition Setup

    You will then be asked to confirm the partition. Select yes and press ",Proceed",.

    The virtual hard drive will now be setup and Debian will proceed the installation ter a few moments.

    Four.Ten – Debian Install Configure Package Manage Step 1

    You will then be asked to confirm your location for the install ter order to find the closest download mirror from you. Select your location and press ",Proceed", and on the next screen, select a mirror location – the very first option is fine (likely and press ",Proceed",. Lastly you will be asked for proxy information. If you have a proxy, inject it, otherwise, leave wit. (if your primary os network connection is setup to use a proxy, the virtual environment will automatically use it).

    During this setup process, the installation will automatically grab the latest opstopping versions from the internet. The process will take some time to accomplish.

    Four.11 – Debian Install Configure Popularity Contest

    You will then be asked to enable ",popularity-contents",. It’s your choice but I would suggest ",No",. Press ",Proceed",

    Four.12 – Debian Install Configure Package Manage Step Two

    Under ",Software selection,", only select ",Debian desktop environment", and Standard system utilities. Press ",Proceed",. The install will run for some time.

    Four.13 – Debian Install Select GRUB Loader

    You will now be asked to confirm that you want to install GRUB boot loader. Select ",Yes", and press ",Proceed",.

    Four.Two – Debian Install Unmount Virtual Drive

    The install process is now finish! Before you proceed, you need to eject/unmount the virtual disc drive containing the ISO opstopping. This should be done automatically but it may not have bot. To confirm that the ISO is unmounted, right click on the circled icon shown te the above picture – if eliminate disk from virtual drive is greyed out, you are good to go. Otherwhise, click that option and the disc icon will be greyed out. Proceed to press ",Proceed",.

    The virtual rekentuig will now reboot. Be patient and wait for a login screen. Upon the bootup screen, the juist installation will boot automatically!

    If this is all too much for you, wij suggest a Powerful Password Recovery Service.

    Step Five) Install All Dependencies

    Five.1 Login To Your Virtaul Envirment

    Now that Debian is installed and running, every time the virtual OS starts, you will be prompted to login. Simply click on your username and come in the password you entered during the installation process. For mij, the username is cracker and the password is cracker.

    Five.Two Welcome To Your Virtaul Envirment

    Welcome to your workspace. Unfortuntely, wij will not be spending much time here. Let’s open a Root Terminal. Click on Applications->,hover overheen Accessories and click on Root Terminal. You will be prompted for a password. If you entered a root password from the inital install, inject that here. Otherwhise your root password will be the same spil the user password that you just used to login.

    Five.Trio Install Guest Additions

    Very first thing wij need to do is install VirtualBox ",Guest Extensions", software. To do so, click on Devices->,Insert Guest Additions CD Pic. You then may be prompted with a confirm screen. Select ",Run", – disregard any errors.

    With the root terminal open, type:

    apt-get -y install apt-get install linux-headers-$(uname -r)

    If asked to confirm, come in Yes.

    Now proceed to restart the virtual opbergruimte by clicking on the username te the upper right corner – te the photo above, the username is ",cracker",. Go to shutdown and restart. You should now be able to copy and paste text back and forward from your primary OS and the virtual environment .

    QUICK Peak: If you still can not copy and paste and you don’t want to re-type all the guidelines below, open this pagina te your virtual environment by going to Applications->,Internet->,IceWeasel and inject the url Utter URL. You can then copy (ctrl+c or right click and copy) and paste it into the terminal (right click and paste – ctrl+v will not work te terminal).

    Five.Four Install Dependicies

    Once the virtual environment comes back online and you login, open a terminal spil root (same spil step Five.Two)

    With the root terminal open, type:

    apt-get -y install build-essential gcc++ libssl-dev ruby git

    With the required packages installed, let’s grab and compile John The Ripper.

    Very first let’s look at what directory you are ter. With the above example, I am at ",/huis/cracker",. This is good. after /huis/ is the username you entered during the inital install. You will want to be te your /huis/USERNAME folder before executing your next step. If you have only entered what wasgoed typed te this guide you should be there.

    Five.Five Download John The Ripper

    Execute the following instruction:

    git clone -b bleeding-jumbo git:// JohnTheRipper

    This code will make a copy of the current John The Ripper release using all updates (spil of 12-24-2013). Execute the following code and wij will start compiling John The Ripper.

    Five.6 Configuration For Your Virtual Environment For Numerous Cores

    If you are only using one core for John The Ripper, you can skip this step but for most, this is significant!

    Before wij complile John The Ripper, wij need to make some switches to the configuration. Come in the following directive to edit the configuration opstopping:

    After this instruction, you should see the above screen. This is the instructions for how to build John The Ripper. Before wij proceed, you need to be careful to only modify the following settings unless of course you know what you are doing.

    NOTE: nano is a linux based text editor. It’s nothing like word. Think notepad but without the use of a mouse.The purple circle ter the above example shows where your cursor presently is. To navigate the verkeersopstopping, you will use the arrow keys. You will want to use the down arrow key to get to the keurig line and make the below switches.

    Scroll down the verkeersopstopping (using the down arrow) until you get to the line that says. With version downloaded on 12-26-13, it is line 35.

    Simply eliminate the pound symbol ter gevelbreedte of the line so it reads – to do this, simply place your cursor on the pound symbol and press the delete key once.

    Go down two lines and switch

    #OMPFLAGS = -fopenmp -msse2

    To – again just eliminate the pound symbol

    OMPFLAGS = -fopenmp -msse2

    Wij now need to save and close the configuration verkeersopstopping. To do so, press ",CTRL+x", followed by ",y", and ultimately inject. You should now be returned to the terminal prompt.

    Five.7 Build (install) John The Ripper

    Inject the following guideline and you should see the above screen:

    Now come in the following instruction

    make clean linux-x86-native

    This program will run for a while

    Five.8 – Test John The Ripper

    Now, let’s test John The Ripper

    ../run/john -test –format=bitcoin

    If successful, you will have something like the photo above. The area te the purple square shows a successful test of John The Ripper. It wasgoed able to process 12.Two attempts vanaf 2nd – Go Speed Racer! Like I said, it’s a very slow process. The inital test however only used one CPU core so if you have numerous cores, you can multiply the text number by core count. Also recall, depending on the speed of the pc on which the wallet wasgoed originally encrypted, the quicker or slower the decryption process.

    Step 6) Let’s Crack A Wallet!

    Quick guide on how to use John The Ripper

    John The Ripper is utterly configurable. Te this guide, wij are going to look at just the basics to get you going.

    Te the list below, every location that says ",cracker", is the usernamed used ter the inital setup (part Two). If you used a different username to setup Debian, substitute that name with cracker.

    For example, if my username wasgoed ",hermit",, ",/huis/cracker/JohnTheRipper/run/john", would be ",/huis/hermit/JohnTheRipper/run/john",

    To commence John The Ripper

    /huis/cracker/JohnTheRipper/run/john /huis/cracker/wallet.hash –format=bitcoin –wordlist=/huis/cracker/wordlist.txt –fork=n

    Let’s pauze this down before wij proceed. Ter the above line, wij are calling John The Ripper and providing four options to utilize. Please also notice the space inbetween each option.

    • Calling John The Ripper: /huis/cracker/JohnTheRipper/run/john
    • Specifying the hash to crack (the wallet key): /huis/cracker/wallet.hash
    • Telling John The Ripper what wij are cracking: –format=bitcoin
    • Providing John The Ripper a wordlist to use: –wordlist=/huis/cracker/wordlist.txt
    • Telling John The Ripper how many CPU cores to use (the n is how many cores to use – vereiste be a number): –fork=n
    To resume John The Ripper
    To see a list of cracked passwords

    /huis/cracker/JohnTheRipper/run/john –show /huis/cracker/wallet.hash

    To view the current status of John The Ripper if running ter background
    To view the current status of John The Ripper if actively running ter terminal

    Simply press any key except ",q", or ",CTRL+c",.

    To abandon John The Ripper and resume at a straks time

    While John The Ripper is running, press the ",q", key. It will shut down but can be resumed at a straks date.

    To samenvatting the ",encrypted hash", from your bitcoin wallet

    /huis/cracker/JohnTheRipper/run/ /huis/cracker/wallet.dat >,/huis/cracker/wallet.hash

    Ter the surplus of the guide, wij will be using all of thesis guidelines to showcase real world usage.

    Let’s test your cracking abilities!

    UH OH. While writing this article, I left behind my fresh bitcoin wallet address – fortunately there are no coins ter it but it’s a fine example for you to test with. I thought my password wasgoed GoBitGo but it’s not. I likely mistyped a character. Can you crack the password?

    This test cracking is an significant step. It will confrim that your virtual environment is decently working and has the capability to potentially crack your password. To test this process, you will need a copy of the encrypted wallet and a word list that I generated to find the password. The wordlist is 500,000 passwords long but fear not, the juist reaction is inbetween line 25,000 and 30,000 which should not take too long to find – even with one CPU core. This list wasgoed created using a dual substitute method and has overheen Two,000,000 passwords. I cut it into a quater to make it a smaller download.

    Required Files

    • Bitcoin Wallet – Click here to download (right click and save spil)
    • Password word list – Click here to download (right click and save spil)

    How to setup John The Ripper

    The below guide will use the files from above to test John The Ripper. When you are ready to crack your own wallet, simply substitute the files from this guide with your own.

    The decryption program does not care about your wallet verkeersopstopping – what it does care about is your wallet’s private key. There are numerous ways to samenvatting the private key but for this example, wij will ask John The Ripper to do so. If you choose to do so another way, you can skip the following step and just place it ter an empty document on the virtual environment.

    6.1 – Upload Required Files

    Wij now need to get the required files into the virtual environment. Ter previous steps, wij setup the environment with ",Guest Additions", which permit us to haul and druppel files directly into the virtual environment tas well spil supporting copy and paste. Unluckily, you can not just haul and druppel files directly onto the virtual environment desktop (well, you can but you will have to switch some settings of Gnome – this is the Linux GUI.) Wij will need to open the Opstopping Manager. To do so, click on Applications->,Accessories->,Files. This will open the verkeersopstopping manager. You can then haul and druppel your files directly into this opstopping manager.

    Please also make sure you are te the huis folder inwards the opstopping manager. Ter the pic above, the folder location is ter the blue square. If you are not under the huis directory, click on ",Huis", on the left side of the verkeersopstopping manager.

    NOTE: If for some reason you could not haul and druppel your files into the opstopping manager and Guest Additions are not working, I would suggest either:

    1. Copying the files to a flash drive, and on top of the virtual environment, click on Devices->,USB Devices and select the USB device containing the files. The virtual environment *should* open a opstopping manager containing the files. You can then haul and druppel them into the other opstopping manager window. Be sure to eliminate your wallet opstopping from the flash drive so you do not have a potentional security punt te the future after it is moved onto the virtual environment.
    2. Email the files to a gmail, hotmail, etc. email address from the rekentuig containing the required files. Then open a web browser from the virtual environment (to open a browser, go to ",Applications->,Internet->,Iceweasel",) and visit your mail provider, login and download your files from your inbox and then eliminate the email from the inbox and trash folder. Be warned, this is a potentional security risk since your are uploading a wallet verkeersopstopping online. You are however incapable to access the wallet so neither would anyone else but use your best judgement!
    3. You may use any other way you can think of to get the files te the virtual environment. You can also google your problem and see if anyone has a solution you think may work.
    6.Two – Samenvatting Key From Bitcoin Wallet

    Now that wij have the requried files on the virtual environment, wij are ready to samenvatting the private key from your wallet opstopping. To do so, ter the terminal, inject

    /huis/cracker/JohnTheRipper/run/ /huis/cracker/wallet.dat >,/huis/cracker/wallet.hash

    Your wallet key will be saved te the verkeersopstopping named wallet hash. If you want to verify this has worked, you can open this verkeersopstopping by injecting

    It will display the following (from the test wallet – your private wallet will have a different hash).

    6.Three Let’s Crack The Wallet

    Very first, let’s go overheen a checklist:

    • Functional virtual environment – CHECK
    • Working and tested John The Ripper – CHECK
    • Bitcoin Wallet Opstopping te virtaul enviorment – CHECK
    • Bitcoin Wallet Key extracted and placed ter separate verkeersopstopping – CHECK
    • Wordlist to crack the wallet verkeersopstopping from – CHECK (straks on, wij will talk about creating your specific wordlist)

    Let’s begin John The Ripper!

    NOTE: Ter the below line, after ",–fork=",, the number Four represents how many CPU cores to utilize. Please come in your desired amount but it can not be more than the amount of cores you have on your pc.

    /huis/cracker/JohnTheRipper/run/john /huis/cracker/wallet.hash –format=bitcoin –wordlist=/huis/cracker/wordlist.txt –fork=Four

    6.Four Status Overview

    If everything works, you will see the above pic. Ter the purple square, you will see John The Ripper is kicking off and using Four cores (AKA knots). Now, it’s time to be patient.

    If you want to check the status, make sure you have the terminal spil the active running application (just click on it) and press any key. You will then be given the information of each CPU core – how swift, how far through the list and current active line from the wordlist. Ter the above example, you can see wij are running Four CPU cores and the cores are ranging from 12.Five to 14.7 guesses vanaf 2nd. It will not total up the speed for you but ter this example, wij are attempting 55+ guesses vanaf 2nd which is not bad!

    When John The Ripper finds the password, it will showcase it. but you need to know what to look for. Above is an example with the found password – I placed it ter the purple opbergruimte for you to see. There you have it! the password is actually GoBktGo and not GoBitGo – foolish mij. Even after it finds the password, the program will keep running on the other cores until it comes to the same conclusion.

    NOTE: Some of you will notice that other CPU cores will find the password spil well and you may be thinking that the program is overlapping on each core but the timing does not work out to that conclusion. What I believe is happening is once the password is found on a core, that core shuts down but the program does not update that the specific line spil checked. It’s likely a programming bug but should not interfere with the process.

    If you toebijten to miss the displayed password, you can retreive the password again by injecting:

    /huis/cracker/JohnTheRipper/run/john –show /huis/cracker/wallet.hash

    Step 7) Generating your own password list

    This is possibly the most significant step! Unfortuntely, this is not a one size fits all solution. When wij look at password decryption, wij ask for the most likley to least likey password canidate and they are often very similar but not close enough for a universal solution. I often find myself creating a custom-built program creating a unique list of potential passwords to very first attempt.

    With that said, the below program can very well find your password if it wasgoed a plain typing error. The program wasgoed not created by GoBitGo but rather I found it online here. It has bot modified to create a list of potential passwords and place them te a verkeersopstopping ready for John The Ripper.

    Go Bit Go offers a customized Password Generation List

    1. You give us a list of possible passwords and wij review your list, looking for similarities and potential mistakes.

    Wij then create a customized program that generates a precise list.

  • Using our Slim Replacement System, wij create an extended large list based on the information you provide.
  • Wij provide you with all-inclusive list containing millions upon millions of possibilities based on your possilble password.
  • One time toverfee: $149.00 (paid ter U.S Dollars, Bitcoins or Litecoins)

    Wij will generate your password list usually within 72 hours.

    If you straks hire us to decrypt your password, and wij are successful, this amount will be credited back to you.

    Email us at to get embarked.

    To use this program, very first you will need to download it via the above verbinding(WordListGenerator.prog). Once downloaded, place it te your virtual terminals verkeersopstopping managers Huis folder. It’s the same instructions spil to section 6.1

    7.1 Modify Bitcoin Wallet Password List Generator

    You will now need to inject what you thought your pass phrase(s) is. Once uploaded, go to your terminal and inject

    You will see something similar to the above picture. On the third line, you will see

    This is the list of what you thought the password could be. You can come in any amount of possibilities here. The formatting needs to however stay the same. Each potential password needs to placed te apostrophes with a comma separating each possibility and no comma at the end. For example, if I thought my password could be BitcoinRules, GoBitGoRules, RulingRules47 or IfIRuledTheWorld, the passphraseList line would be:

    Got it? Good! But what if you think your password may contain an apostrophe? Simply add a back slash behind it. Here is an example of a single potential password and it contains an apostrophe:

    Now that you have entered your potential passwords te the opstopping, it’s time to save the opstopping by pressing ",CTRL+X", followed by ",y", and ultimately press the come in key. To run the program:

    Wanna see the genereated list? Simply come in

    To uitgang viewing the wordlist, press ",CTRL+x",

    7.Two How to use generated password list

    If you got this far, you’ve already executed a cracking directive. All you need to do is go after step Five again, except this time, you are not going to upload a wordlist verkeersopstopping since you created one on the server.

    Step 8) What do I do once the password is found

    Step 1 – Leap up and down for joy – for a minium of Five minutes!

    Step Two – Switch your wallet passphrase. Your current wallet can potentially be a security risk. By switching the password, it invalidates the old wallet.

    Step Trio – Figure out a good solution, specific to you, for storing your wallet opstopping and passphrase. You can use a paper wallet, save the passphrase on a flash drive and the wallet on another drive, write down the passphrase and save it somewhere safe. To be fair, you are one of the fortunate ones – this will not work for eveyone and you do not want to go through this again!

    Step Four – This is the most significant step of all – DONATE, please pretty please. It took fairly a bit of time and energy to create this tutorial. This is also a decryption process that wij, and others, charge for. I believe information should be free and dare I say open source! I do also believe that if you have gotten any value from it, that value should be collective.

    • Bitcoin: 1GuVoL7sduJYNiUDjHyETvQxThWJ6zcKn6
    • Litecion: Lb7xUUM6sHc4gFm2CjeZZu2LNzjrHZAemE
    • For other currencies, please voeling us!

    Step 9) Well, this didn’t work. Now what?

    Do not give up hope! Wij have options!

    • GoBitGo does suggest professional recovery services for a very fair price. Please visit this pagina for more information.
    • GoBitGo does suggest custom-made wordlist and large-list generation based on your potential password(s). Please read above at step 7 for more information about this service or email us at
    • Keep a schrijfstift and paper with you at all times and keep the idea of your password te the back of your mind. Possibly your subconcious will bounty you with the password!
    • Computers are getting quicker and swifter! Who knows what will be possible te the future with forgotten passwords. Store your old wallet somewhere safe with a list of potential passwords and maybe someday it can be cracked.

    Thank you for reading!

    If this process worked for you, wij would love to hear about it! If you got stuck along the way, send an e-mail or inject a comment below.

    Got something nice to say? Inject it below or email it to us! Thank you!

    Do you have something that you would like to say or share?

    Otherwise, accomplish the plain form below to postbode your message.

    (Will not be displayed to others)

    (This is what others will see)

    (Will not be displayed to others)

    (Will be used to access your account)

    If you can see the input field below, please do not inject anything te it.

    Related movie: How I Buy and Sell Bitcoin for a Living

    Leave a Reply

    Your email address will not be published. Required fields are marked *