BIP39 Passphrase Recovery (Or Hidden Wallet Password, 25th word) For Ledger, Trezor, Keepkey, etc

so I made a number of videos that look
at ways to recover from an error in your
24 words seed phrase but the really
good thing about these tools like
BTCRecover is they can also help you to
recover from an error in your passphrase
so this can happen when you’ve typed in
your recovery phrase it’s correct it’s
right but then you notice that your
wallet is spitting out a whole bunch of
addresses that don’t seem to quite line
up with where your crypto should be and
there’s no transactions or anything like
that lining up with it and you might be
thinking yourself oh no because you’d
written down your recovery phrase but
you’d rely on the fact you would
remember your passphrase and you know
this is actually a really easy mistake
to make and this is one of the reasons
why both ledger and Trezor warn users
that adding a passphrase to their
recovery phrase is an advanced feature
because it’s easy to forget and it’s an
easy mistake to make in the some wallets
like electrum don’t even ask you to type
in your passphrase twice so if you’re just in a
hurry and working in an Electurm
it’s entirely possible you could just have a typo in your passphrase and send
the funds to the wrong place and not
realize you’ve made that mistake for
months and months and months and I’m
gonna make a number of videos as to some
really easy ways to make sure that
you’re validating your passphrase before
you start loading those up with crypto
there’s some important notes to start
firstly you will need a correct 24 word
seed for this tool to work in the way
that I’m going to demonstrate here today
you also need to know at least one
public address that was used with your
wallet so basically what this does is it
looks at a variety of tests a whole
bunch of different pass phrases and is
looking for this public address that
you’ve listed so let’s say for example
like I have in my other videos we
purchased some Ethereum on coinbase
and we remember we sent it to this
address so that’s the address we’re
going to use so firstly you need to
download the repository for the segwit
fork of BTCRecover I cover this in
another video the link will be in the
description to both my original video
and this repository that I’ll use so you
can any to set up an air-gapped ubuntu
18.04 environment which is covered in my
previous video on this so if you watch
it for about the twelve and a bit
minutes to 21 minutes you get
step-by-step instruction
on how to do that you can run this stuff
directly in Windows if if you’re feeling
that desperate and the whole idea of
using Linux is too confronting so that’s
something we can do and you know
alternatively if there is enough demand
so you know say 10 or people so people
are requested in the comments or someone
decides to sponsor it I can also update
and distribute an amnesic Linux
distribution with these crypto tools
prepackaged so like a live USB you can
just boot that’ll have all this stuff
baked in
so once we’ve loaded up our air-gapped
ubuntu environment we have two options
to use BTCRecover to recover a
passphrase firstly we can use a password
list file in my opinion a password list
is really easy to understand in a really
good place to start so that’s where
we’re going to start so password list is
good to use if you think you have a
pretty good idea as to what your
password was or maybe you’ve got a few
options for passwords you might have
used but you think you maybe made a typo
in there somewhere so basically how this
works is you create a list of passwords
that you think it was you will also need
to add any likely spelling mistakes that
you might have made because it won’t go
and try and add in extra letters for you
so for example this file might password
file might have like six rows in it so
I’ve actually done a common misspelling
of Ethereum in there that I often see
online as well you know maybe you
weren’t sure how much year it was and
you thought maybe it was one of those
two as well so you know a file would
have these six rows in it and you can
make password files that are quite long
because basically increasing the size of
your password file will give you a
linear increase in computation time so
what that means is if you double the
number of passwords in your password
list file it will take twice as long and
that’s quite different to the token file
which we’ll look at later so this is why
I suggest that even a long list of
potential passwords might be a better
approach than trying to use a token list
just because it’s really easy to
understand what you’re doing and it
decreases the chance you’re going to
make a mistake and have BTC recover do
something that says it’s going to take
you know a days and weeks
when it turns out you might have made a
mistake in the token file the other
thing that you can use is called a token
list file and that’s where you might
remember parts of your password or let’s
say blocks of letters and words that
make up a large password and you know
this can work really well if you have
like a small number of tokens that your
passwords will be made up of but once
your list starts getting longer you
might need more so for example our token
file might include the following lines
because we remember that we would often
use these different characters to make
up passwords but the issue is that for
it just to test all possible
combinations of these including all type
of variations if we’re working on a
password this long that would require
thousands of years so to use the token
file we need to help it out and we can
give it instructions to know roughly
where we think these words should go so
we might remember that our password
started probably with one of these three
words so start with you know Ethereum
or Etherium or Bitcoin you know we
might remember that would have ended
with one of these years and that maybe
we had this symbol somewhere in between
these are the tokens so doing that
significantly decreases the amount of
possible password combinations that a
token file will produce and it makes it
quite manageable to recover even some
fairly long and potentially complex
passwords if you say have a habit of
like stringing different passwords of
different sets of words together but
this is the point is the documentation
for how to do a token file can get quite
complex it is well documented on BTCRecover but I won’t spend time on going
into the complex details of how to
intricately craft a token file because
that is just way beyond the level of
complexity that I think is helpful to
deal with here and you know something
like forums reddit or the comments
section is much better place for that so
my suggested workflow for this is
firstly that you create a secure
environment to run the tool
I also suggest that you get the tool
working and test it with one of these
scenarios that I’m going to go through
here below just so that you can make
sure you’re getting the syntax right and
you can be confident that you understand
how the tool works before putting your
own real information in there
I’d suggest you start with a password
list and only move on to a token list if
you don’t have success with that the
first password list okay so our first
example is going to be looking for
what’s basically the first address on
the default derivation path so I’ve got
the phrase that were using I’ve got the
actual passphrase you can see there it’s
going to type it with it and we’re going
to be looking for the first address in
the first account on the default
derivation path and that’s this one right
here we’re going to be using a password
file that’s this one here it just has
one word in it one line that’s it so we
our best memory of it was that it was
this and look come on we’re going to use
to find that is this one here so
basically what we’ve got with I’ve
basically put in a lot of different
options here that I think are going to
give you the best chance of finding it
first go so we’re gonna check for a typo
assuming it caps lock on we’re going to
check for a typo similarly swap some
letters maybe we accidentally hit one
letters twice maybe we accidentally left
one out maybe we had one letter
capitalized or not we’re a little for a
maximum of three typos and we’re also
going to use this typo map here which
what it does is it’s four if you
accidentally hit a little letter next to
one of the ones in the passphrase we’re
looking at the default bip32 path and
our wallet type is Ethereum our address
generation limit is just one because
we’re only looking at the first address
so we’ll just run that so it’s asking us
to enter the extended public key we
don’t have that we have one address and
we want our best guess of the phrase
well we know what the right phrase is so
I’ll put that in there and there we go
so it’s working and there we go so that
found it in about 30 seconds found the
password YouTube so we now know that the
correct passphrase is ‘youtub’
so we can start using that so I move on
to a second example and that is a longer
password and we’re gonna have a longer
password list too so this is actually
going to use a different pass phrase
which means that all of the addresses it
generates will be different for the test
so we’re going to be looking for this
here and you know we think the password
was Ethereum2019 so we’ll use this
password file here and I’ve also added
in you know listing ah maybe I
misspelled Ethereum when I was doing it
I wasn’t sure which year it was and
maybe you’ll use one of these Bitcoin
style addresses too so we’ll just stick
all of those variants in there we’re
going to use this command here and the
only real difference for this one is
that we’re using a different password
file so that’s this one here it’s gonna
be the same phrase we don’t have an X
pub file the address we’re looking for
is this one which is different to the
one we use in the last example we know
our seed which is this then we hit go
this one is gonna take a little while
so this one’s a good one where you know
it’s time to go and get yourself a
coffee all right so we can see it found
it and there you go so obviously we’d
miss spelt Ethereum and I whoops it was
2018 not 2019 and no capitalization so
it found it and took about eleven
minutes but it could have taken an hour
if it had had to go all the way to the
end so that’s great so let’s also have a
look at what it would look like to do
basically the same recovery but to use a
token list so this was a more advanced
way of doing it and this token list here
well he was a very similar password list
to this obviously it would include more
because you know everything could
potentially have an at in it but you
know it’s just an easy way to chain
together lots of blocks of a password so
this time we’re also going to be using
the tenth address so say we couldn’t
remember what the first address was
we’re going to using the tenth address
and that’s particularly common for
things like Bitcoin that increment the
address every time but for things like
Ethereum that might mean that on say
myetherwallet you would have scrolled
through say the first couple of pages of
addresses and then selected the ten so
perhaps using using the first nine for
different things and my video on myetherwallet talks about that it’s also going
to be coming from a different derivation
path so if you have ledger live or
something like that it talks about
different accounts and every time you
add an account in ledger life it changes
the derivation path and that’s important
because the derivation path is used in
this tool we’re using the same password
for an example too but yes we’re looking
for a different address this command is
the same as what we had before but
you’ll notice this time we’ve set the
address limit generation limit to 20
because we’re not just after the first
address we’re also setting the
derivation path to this so m/44/60/0/1 the
other thing that’s important to note is
that increasing the address limit to 20
actually doesn’t take 20 times longer so
you know doubling the number of
addresses you’re generating from 10 to
20 will actually increase the processing
time by about 20% so if in doubt
particularly if you’re using a coin like
Bitcoin that gives you a new receiving
address every time you go to receive
coins you know just set this address
limit to be say you know 10 20 or even
50 it won’t increase the processing time
enormous ly so it’s a good thing to do
so for in this example we’re doing 20
and we’re using the token file that is
this one here so it’s using this tokens
positional dot txt so here we go we
don’t have an X pub file in these
examples the address we’re looking for
is this one and the seed we know that is
correct is this one here so again this
is the point where you grab you a
Bitcoin mug go and get a coffee if
you’re wondering where my cute Bitcoin
mug came from it was a gift from my wife
and you can just get them on Amazon so
if you’d like one of them there’ll be a
link in the description so that’s just
finished running now and you’ll notice
it’s dark behind me it took a bit longer
to run and the reason is that I actually
made a typo up here
sorry up here in that I put in the wrong
derivation path so I’ve fixed to my
notes and they will be correct in the
description for the video but I didn’t
notice that I’d had that air until have
been running for two hours so I fixed it
up ran it again and off we go and as you
can see it found the phrase just the
same as with the password list and I
only took about 10 minutes to it and a
full run would have taken about three
hours so there we go and I think that’s
also just a really good example that
it’s really important that you have
things like your derivation path right
because again it’s very easy to make a
typo that’ll just have this do a full
run that might take hours now is and
find nothing hey look I hope that’s been
helpful in for helping you to recover
from an error in your passphrase and as
you can see here it’s something that is
definitely doable to recover at the same
time this should probably also be a good
reminder and a good illustration that a
short passphrase for your in addition to
your 24 word seed is on its own not an
invincible level of security so even
though you have a passphrase you still
need to keep your 24 words seed secure
but put them that give us a yell if
you’ve got any other questions or
queries with this example so best of
luck thanks for watching I hope that was
helpful just hit subscribe if you’d like
to be kept in the loop about future
content I make to help people stay safe
in the crypto space and to recover if
they get into trouble or if there’s a
question you’d like some more
information about or topic you’d like me
to cover in the future just leave a


Add a Comment

Your email address will not be published. Required fields are marked *