Skip to content

Commit

Permalink
Update docco with usage examples for seed unscrambling
Browse files Browse the repository at this point in the history
  • Loading branch information
3rdIteration committed May 1, 2020
1 parent cfd6712 commit 6138cd3
Show file tree
Hide file tree
Showing 4 changed files with 73 additions and 0 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@
## Setup and Usage Tutorials ##
[I have created a growing playlist](https://www.youtube.com/playlist?list=PL7rfJxwogDzmd1IanPrmlTg3ewAIq-BZJ) that covers a number of usage examples for using this tool to recover seed phrases, BIP39 passphrases, etc.

This repositoy also included some [example commands and file templates](docs/Usage_Examples/UsageExamples.md) for the usage scenarios covered in YouTube videos.

My suggestion is that you find a scenario that is most-like your situation and try to replicate my examples to ensure that you have the tool set up and running correctly. If you have a specific situation that isn't covered in these tutorials, let me know and I can look into creating a video for that.

[Sending me a message via Reddit](https://www.reddit.com/user/Crypto-Guide) is likely the best channel to reach me for support with this tool.
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
# Descrambling 12 Word Seeds
YouTube Video can be found here:

Three types of token files are provided for these tests. Token files that will find the result on their first check, token files that will find the result as the last possible combination and those which will find it at some point inbetween.

The idea is that these allow you to quickly verify that things are working (finding on the first result), get an idea for how long a full run might take (last result) and also try something representative of a real world situation.

If you are just descrambing a 12 word seed, there isn't much point running without --no-eta, as the number of seeds to be tested can be easily worked out and the seed generator can easily keep up with at least 48 threads.

**Performance**

On a 48 core Linode you can expect to...
* Descramble a 12 word Electrum seed in less than 15 minutes…
* Descramble a 12 word BIP39 seed in less than 50 minutes…

_You can expect things to take about 5 times this long on a current (mid 2020), mid-range CPU._

## Electrum
#### Legacy Wallet (Last Result)
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --addr-limit 1 --addrs 1CU62HPowYSxhHiiNu1ukSbMjrkGj4x52i --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\lastcombination_electrum.txt --wallet-type electrum2
`
#### Segwit Wallet
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --wallet-type electrum2 --addr-limit 1 --addrs bc1qtylwmarke39nysxepdx5xzfatvrlel5z8m0jx2 --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\randomcombination_electrum.txt --bip32-path m/0'/0
`
## BIP39
#### Ethereum Address (Default derivation path for Trezor, MEW)
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --wallet-type ethereum --addr-limit 1 --addrs 0x66F9C09118B1C726BC24811a611baf60af42070A --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\randomcombination_bip39.txt --bip32-path m/44'/60'/0'/0
`
#### Legacy BTC Address (First Result)
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --wallet-type BIP39 --addr-limit 1 --addrs 17GR7xWtWrfYm6y3xoZy8cXioVqBbSYcpU --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\firstcombination_bip39.txt`

#### Legacy BTC Address (Last Result)
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --wallet-type BIP39 --addr-limit 1 --addrs 17GR7xWtWrfYm6y3xoZy8cXioVqBbSYcpU --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\lastcombination_bip39.txt`

#### Litecoin Native Segwit Address (Seed with Positional Anchors for known words)
`python3 seedrecover.py --no-dupchecks --mnemonic-length 12 --language EN --dsw --wallet-type BIP39 --addr-limit 1 --addrs ltc1q9srpp39hev6dpsxjjp8t5g0m3z7509vc9llalv --tokenlist .\docs\Usage_Examples\2020-05-02_Descrambling_a_12_word_seed\fixedwords_bip39.txt --bip32-path m/84'/2'/0'/0`

# Token File Templates Used Above
Can be found in the same folder as this document on in the repository...
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
^1^ocean
^2^hidden
^3^kidney
^4^famous
^5^rich
^6^season
gloom
husband
spring
convince
attitude
boy
20 changes: 20 additions & 0 deletions docs/Usage_Examples/UsageExamples.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
# Usage Examples

This page provides links to a number of examples tht demonstrate how the setup and syntax to use BTCRecover in a number of different recovery scenarios. (Generally with a corresponding YouTube video)

The commands given can be pretty much copy/pasted as-is to allow you to recreate the examples given in the YouTube video.

**Note:** Some changes may be required based on your platform, often simple things like using "python" vs "python3".

**Python Version:** Many of these videos were created using different forks of BTCRecover. The resources and commands here may differ slightly, but are designed to work with this fork under Python3.

## Seed Recovery

[Descrambling 12 word BIP39 Seeds](./2020-05-02_Descrambling_a_12_word_seed/Example.md) (Electrum Legacy, Electrum Segwit, BIP39 Bitcoin and BIP39 Ethereum)

## Password Recovery



## AddressDB Creation

0 comments on commit 6138cd3

Please sign in to comment.