Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Hash bitcoin brain wallet address from passphase?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
yeah, that sounds acceptable (and almost exactly the amount of time I was thinking about that would be needed by a mid/high end consumer CPU).
This also proofs that it's not that clever to use brain wallets and it's also quite dangerous that the user can choose any (mid-size) password they want. Maybe a random password automatically generated or an entropy check etc would be needed, just to avoid users using long but weak passwords.
It would be also interesting to know if some users generated an address that already existed (by incident!), because user choosen passwords statistically seem to be weak even if they need to be of a certain length. The sha256 () of a weak password doesn't protect you that someone else already has that private key. I think this is a known problem and therefore the bip38 approach would be much better (with random data). This is also why I thought about bip38 when I saw paper wallet in the first post of this thread.
(07-13-2018, 12:59 PM)philsmd Wrote: [ -> ]yeah, that sounds acceptable (and almost exactly the amount of time I was thinking about that would be needed by a mid/high end consumer CPU).
This also proofs that it's not that clever to use brain wallets and it's also quite dangerous that the user can choose any (mid-size) password they want. Maybe a random password automatically generated or an entropy check etc would be needed, just to avoid users using long but weak passwords.
It would be also interesting to know if some users generated an address that already existed (by incident!), because user choosen passwords statistically seem to be weak even if they need to be of a certain length. The sha256 () of a weak password doesn't protect you that someone else already has that private key. I think this is a known problem and therefore the bip38 approach would be much better (with random data). This is also why I thought about bip38 when I saw paper wallet in the first post of this thread.

Which is why my brain wallet is a random bunch of characters, not words. If ppl only see my address but has no idea it hash from a short passphase, it's still secure
If i understand correctly, you are trying to recover a brainwallet via the original passphrase/seed? Tools already exist for this, and I am able to do this already, though not with hashcat. The one that comes to mind as being capable immediately would be RyanC's brainflayer, designed specifically for cracking brain wallets.

https://github.com/ryancdotorg/brainflayer
Pages: 1 2 3