Bir Trezor Cüzdan Parolası, Bir Ömür Boyu Kaba Kuvvete Dayanarak KeychainX Uzmanları Tarafından 24 Saat İçinde Nasıl Kırıldı – Sponsorlu Bitcoin Haberleri

Have you lost the passphrase for an hardware wallet and looking how to recover your coins? Here is how the AnahtarlıkX recovery experts have done just that for a client. This is a trusted service provider that specializes in recovering lost crypto wallets and they can even recover funds from broken hardware drives, phones or Trezor/Ledger wallets.

Recovering a Trezor Wallet Passphrase

A TREZOR hardware wallet is a security device that protects the user from key loggers and phishing e-mail, keeping the user’s Bitcoin and crypto safe. Various hacking groups could open the device by mitigating side-channel attacks; however, the method was only possible because ‘a passphrase was not used’. When making a transaction, the user only enters a PIN and therefore protects the private key of the Bitcoin. The only backup is a 12/24-word mnemonic that determines which addresses are stored on the device.

Recently, a client asked the KeyChainX team to brute force their TREZOR wallet as the client had forgotten the passphrase, commonly known as the 25th word. The passphrase was designed to ensure funds are safe if a user loses their TREZOR and someone gets hold of their 24-word mnemonic. The passphrase can be a word, a number, or a string of random characters. The idea behind it is to deceive the thief into believing that once he opens someone’s TREZOR or recovers it with the 24 words, he will only find a “fake” or low-value amount of BTC. This specific client had 10 USD worth of Bitcoin stored on their TREZOR’s main wallet based on the 24 words, but the real treasure trove was a wallet hidden behind his passphrase, the value the team cannot disclose.

The KeyChainX team split the job into two phrases (or three). But before the team could start, the client wanted to meet face-to-face. As travelling to South America was out of the question as we had a security presentation scheduled in Europe, the client agreed to a Skype “interview”. After 2 hours, the team convinced him that the team would not run away with his funds.

How Did the Team Crack It Open and Brute Force It?

The first part is data sourcing. First, the team gathered information about the possible hints to the passphrase, as a six characters passphrase would take forever to brute force with conventional tools. For example, a GITHUB repo by the user gurnec has a tool called Btcrecover that brute forces a couple of hundred passwords per second on average. For example, to break a 5-character password would take two days; if you add capital letters and numbers six months.

The client’s password consisted of more than 5-characters with both upper- and lower-case characters, possibly numbers and a unique character, which could approximately take 2+ years to brute force with the tool; that is, if the main wallet was the first created on the TREZOR. This was not the case. Instead, the “fake” wallet was created; first, there were transactions, and the genuine wallet was created later. Then, the team was forced to search for multiple wallet addresses and change addresses, which multiplied the time required to break the encryption.

Since this was not the first time the team had received a request to open a TREZOR, the team decided to build a custom-made tool that uses GPUs about a year ago. The custom tool speed is 240,000 passwords per second, an increase by 1000x compared to the gurnec GitHub source.

Customizing Mask Attack

The client gave the KeyChainX team 5 wallet addresses he had used in the past, a list of hints, and the 24-word mnemonic. First, the team had to determine if the 24 words were valid and if the mnemonic was valid.

Next, they had to choose which derivation path to search for; a TREZOR can use both LEGACY and SEGWIT addresses, and their specifications can easily be distinguished by looking at the first character of the address. LEGACY starts with one and SEGWIT with 3. They also use different derivation paths depending on the BIP version, so the team had to specify which wallet type and derivation path to use. Finally, SEGWIT uses m/49’/0’/0’/0 and LEGACY has several options. Finally, TREZOR fired up the custom tool with 8 x 1080Ti Founders Edition GPU cards (they cost up to 1000USD each depending on specification and model).

At first, the team searched an ample space of characters and words, but the mask and algorithm took approximately two months too long. The team had to change tactics and look at the TREZOR owner’s hints and find a pattern. The pattern used small/capital characters as the first password character. Then several lower-case characters, and then limited combinations of numbers (birth dates, months, pin codes to safe etc.). Two unique characters were also used, so the team had to add that into account. The mask was modified again, and BOOM, the team found the password within 24 hours after the “interview”.

A quick message on WeChat, asking the client for their BTC wallet (the team advised him not to use the same TREZOR again). The team transferred the client’s funds to them within the hour.

How a Trezor Wallet Passphrase That Should Have Taken a Lifetime to Brute Force Was Cracked by KeychainX Experts
KeychainX GPU Crack Rig

Kripto Cüzdan Kurtarma Uzmanları

Henüz KeychainX'e aşina değilseniz, 2017'den beri faaliyet gösteren bir kripto para birimi cüzdan kurtarma hizmetidir. Şirket, dünyanın her yerinden birçok müşterinin cüzdan anahtarlarını kurtardı ve onların övgü dolu incelemelerinden bazılarını şurada görebilirsiniz: TrustPilot KeychainX'in neredeyse mükemmel bir 4.9 'Mükemmel' puanı olduğu yer. Oku bunu göre farklı cüzdan türlerinin kilidini nasıl açtığı hakkında, okuyun blockchain cüzdanlarıyla çalışmaları hakkında ve okuyun Anahtarları özellikle Multibit Classic veya Multibit HD'den kurtarma hakkında.

KeychainX, 2021'de ABD'deki doğum yerinden, ilgili şirketlerin yoğunluğu nedeniyle blok zinciri topluluğunda Crypto Valley olarak bilinen dünyanın bir parçası olan Zug, İsviçre'ye taşındı. Şirketin CEO'su Robert Rhodin, doğal olarak kripto cüzdan kurtarma alanında önde gelen uzmanlardan biri.

Şirket ziyareti hakkında daha fazla bilgi edinmek için AnahtarlıkX.io veya sadece bir e-posta gönderin [e-posta korumalı] şifre kurtarma hakkında konuşmanız gerekiyorsa.


Bu sponsorlu bir gönderi. Hedef kitlemize nasıl ulaşacağınızı öğrenin okuyun. Aşağıdaki feragatnameyi okuyun.

Bitcoin.com Medya

Bitcoin.com, kripto ile ilgili her şey için önde gelen kaynaktır.
İletişim [e-posta korumalı] basın bültenleri, sponsorlu gönderiler, podcast'ler ve diğer seçenekler hakkında konuşmak için.

Resim Kredileri: Shutterstock, Pixabay, Wiki Müşterekler

Feragatname: Bu makale bilgilendirme amaçlıdır. Satın alma veya satma teklifinin doğrudan bir teklifi veya talebi ya da herhangi bir ürün, hizmet veya şirketin tavsiyesi veya onayı değildir. Bitcoin.com yatırım, vergi, yasal veya muhasebe danışmanlığı sağlamaz. Ne şirket ne de yazar, doğrudan veya dolaylı olarak, bu maddede belirtilen içerik, mal veya hizmetlerin kullanımından veya bunlara güvenilmesinden kaynaklanan veya bunlarla bağlantılı olduğu iddia edilen hasar veya kayıplardan doğrudan veya dolaylı olarak sorumlu değildir.

Source: https://news.bitcoin.com/how-a-trezor-wallet-passphrase-taking-a-lifetime-to-brute-force-was-cracked-by-keychainx-experts-in-24-hours/