Read bitcoin wallet file
During this setup process, the installation will automatically grab the latest file versions from the internet. The process will take some time to complete.
You will then be asked to enable "popularity-contents". It's your choice but I would suggest "No". Under "Software selection," only select "Debian desktop environment" and Standard system utilities. The install will run for some time. You will now be asked to confirm that you want to install GRUB boot loader. Select "Yes" and press "Continue". The install process is now complete! This should be done automatically but it may not have been. To confirm that the ISO is unmounted, right click on the circled icon shown in the above image - if remove disk from virtual drive is greyed out, you are good to go.
Otherwhise, click that option and the disc icon will be greyed out. Proceed to press "Continue". The virtual computer will now reboot. Be patient and wait for a login screen. Upon the bootup screen, the correct installation will boot automatically! If this is all too much for you, we offer a Powerful Password Recovery Service.
Click here for more information. Now that Debian is installed and running, every time the virtual OS starts, you will be prompted to login. Simply click on your username and enter the password you entered during the installation process.
For me, the username is cracker and the password is cracker. Welcome to your workspace. Unfortuntely, we will not be spending much time here. Let's open a Root Terminal. You will be prompted for a password. If you entered a root password from the inital install, enter that here. Otherwhise your root password will be the same as the user password that you just used to login. First thing we need to do is install VirtualBox "Guest Extensions" software.
You then may be prompted with a confirm screen. Select "Run" - ignore any errors. Now proceed to restart the virtual box by clicking on the username in the upper right corner - in the image above, the username is "cracker". Go to shutdown and restart. You should now be able to copy and paste text back and forth from your primary OS and the virtual environment. Once the virtual environment comes back online and you login, open a terminal as root same as step 5.
First let's look at what directory you are in. If you have only entered what was typed in this guide you should be there.
This code will make a copy of the current John The Ripper release using all updates as of Execute the following code and we will begin compiling John The Ripper. If you are only using one core for John The Ripper, you can skip this step but for most, this is important! Before we complile John The Ripper, we need to make some changes to the configuration. Enter the following command to edit the configuration file:. After this command, you should see the above screen.
This is the instructions for how to build John The Ripper. Before we proceed, you need to be careful to only modify the following settings unless of course you know what you are doing. It's nothing like word. Think notepad but without the use of a mouse. The purple circle in the above example shows where your cursor currently is. To navigate the file, you will use the arrow keys. You will want to use the down arrow key to get to the correct line and make the below changes.
Scroll down the file using the down arrow until you get to the line that says. With version downloaded on , it is line Simply remove the pound symbol in front of the line so it reads - to do this, simply place your cursor on the pound symbol and press the delete key once. We now need to save and close the configuration file. You should now be returned to the terminal prompt.
If successful, you will have something like the image above. The area in the purple square shows a successful test of John The Ripper. It was able to process Like I said, it's a very slow process. The inital test however only used one CPU core so if you have multiple cores, you can multiply the text number by core count. Also remember, depending on the speed of the computer on which the wallet was originally encrypted, the faster or slower the decryption process. John The Ripper is extremely configurable.
In this guide, we are going to look at just the basics to get you going. In the list below, every location that says "cracker" is the usernamed used in the inital setup part 2.
If you used a different username to setup Debian, replace that name with cracker. Let's break this down before we continue. In the above line, we are calling John The Ripper and giving four options to utilize. Please also notice the space between each option. While John The Ripper is running, press the "q" key. It will shut down but can be resumed at a later date. While writing this article, I forgot my new bitcoin wallet address - luckily there are no coins in it but it's a great example for you to test with.
I thought my password was GoBitGo but it's not. I likely mistyped a character. Can you crack the password? This test cracking is an important step.
It will confrim that your virtual environment is properly working and has the ability to potentially crack your password. To test this process, you will need a copy of the encrypted wallet and a word list that I generated to find the password.
The wordlist is , passwords long but fear not, the correct answer is between line 25, and 30, which should not take too long to find - even with one CPU core. This list was created using a double replace method and has over 2,, passwords. I cut it into a quater to make it a smaller download.
The below guide will use the files from above to test John The Ripper. When you are ready to crack your own wallet, simply replace the files from this guide with your own. The decryption program does not care about your wallet file - what it does care about is your wallet's private key. There are multiple ways to extract the private key but for this example, we will ask John The Ripper to do so. If you choose to do so another way, you can skip the following step and just place it in an empty document on the virtual environment.
We now need to get the required files into the virtual environment. In previous steps, we setup the environment with "Guest Additions" which allow us to drag and drop files directly into the virtual environment tas well as supporting copy and paste.
Unfortunately, you can not just drag and drop files directly onto the virtual environment desktop well, you can but you will have to change some settings of Gnome - this is the Linux GUI. We will need to open the File Manager. This will open the file manager. You can then drag and drop your files directly into this file manager. Please also make sure you are in the home folder inside the file manager. In the image above, the folder location is in the blue square.
If you are not under the home directory, click on "Home" on the left side of the file manager. If for some reason you could not drag and drop your files into the file manager and Guest Additions are not working, I would suggest either:. Now that we have the requried files on the virtual environment, we are ready to extract the private key from your wallet file.
To do so, in the terminal, enter. Your wallet key will be saved in the file named wallet hash. If you want to verify this has worked, you can open this file by entering. It will display the following from the test wallet - your personal wallet will have a different hash. Please enter your desired amount but it can not be more than the amount of cores you have on your computer. It is intended to protect your privacy, but also to prevent you from requesting bitcoins on a wallet that you do not control.
Yes, see Cold Storage. You should sweep them instead. If you want to import private keys and not sweep them, you need to create a special wallet that does not have a seed. Sweeping private keys means to send all the bitcoins they control to an existing address in your wallet.
The private keys you sweep do not become a part of your wallet. Instead, all the bitcoins they control are sent to an address that has been deterministically generated from your wallet seed.
Enter the private keys in the appropriate field. That is the destination address and it will be from your existing electrum wallet. You can create a transaction with several outputs. In the GUI, type each address and amount on a line, separated by a comma. This might happen if you are trying to spend a large number of transaction outputs for example, if you have collected hundreds of donations from a Bitcoin faucet.
When you send Bitcoins, Electrum looks for unspent coins that are in your wallet in order to create a new transaction. Unspent coins can have different values, much like physical coins and bills. If this happens, you should consolidate your transaction inputs by sending smaller amounts of bitcoins to one of your wallet addresses; this would be the equivalent of exchanging a stack of nickels for a dollar bill.
The gap limit is the maximum number of consecutive unused addresses in your deterministic sequence of addresses. Electrum uses it in order to stop looking for addresses. Electrum will generate new addresses as you use them, until it hits the gap limit. If you need to pre-generate more addresses, you can do so by typing wallet. This command will generate one new address. Note that the address will be shown with a red background in the address tab to indicate that it is beyond the gap limit.
The red color will remain until the gap is filled. Addresses beyond the gap limit will not automatically be recovered from the seed. For example, if you wanted to generate 50 addresses, you could do this:. To upgrade Electrum, just install the most recent version. The way to do this will depend on your OS. Note that your wallet files are stored separately from the software, so you can safely remove the old version of the software if your OS does not do it for you.
For this reason, it is not recommended to downgrade Electrum to an older version once you have opened your wallet file with the new version. The older version will not always be able to read the new wallet file. As part of the Import Private Key process, you have the option to import keys directly, or sweep the keys. This is a safer more preferred method over importing keys to your wallet. In the Import section, the third sub-section option is Import using paper wallet.
Just as it sounds, you can import with a private key but by using a QR code. Instead of typing in your alphanumeric private key, you can scan your QR code instead and import the private key that way. This section keeps a running list of backups of your Blockchain Wallet. Every time there is a change in your wallet, a new backup is created. With the automatic backups, at any time you can import a previous wallet file. In this third section, Blockchain accepts wallets in different formats, with AES encrypted wallet backups being the most common and secure for Blockchain users.
Just copy and paste your wallet backup data into this section to manually import your wallet backup.