We specialize in recovering access to Ethereum wallets using advanced cryptographic methods. Here’s what we offer:
1. Decrypting Ethereum JSON Files
- Problem Solved: Forgotten password for your JSON wallet file (e.g., MyEtherWallet, GETH, MIST).
- Technical Process:
- JSON files are encrypted using AES-128-CTR with a key derived from your password via scrypt (N=262144, r=8, p=1).
- We use optimized GPU/CPU clusters to brute-force or dictionary-attack the password, leveraging any clues you provide (e.g., partial passwords, keyword hints).
- Supported Formats: UTC/JSON files from MyEtherWallet, MIST, GETH, and ETH presale wallets.
2. Ethereum Presale Wallet Recovery
- Problem Solved: Lost passwords for 2014–2016 ETH presale wallets.
- Technical Process:
- Presale wallets use a weaker scrypt implementation (N=262144, r=1, p=8), making brute-force attacks feasible with specialized hardware.
- We extract the private key directly from the JSON file after decryption.
3. Corrupted ETH JSON File Repair
- Problem Solved: Wallet files damaged by incomplete saves, disk errors, or improper edits.
- Technical Process:
- Analyze hex/JSON structure to salvage encrypted keys or repair formatting errors.
- Extract partial data (e.g., ciphertext, IV, salt) to attempt decryption.
4. Private Key Extraction
- Recover: Private keys from software wallets (MetaMask, Exodus) or hardware wallets (Trezor, Ledger) via:
- Seed Phrases: Rebuild BIP39 mnemonics (12/24 words) and derive keys using BIP32/BIP44 paths.
- Exodus seed.seco Files: Decrypt backups using password-cracking methods.
Supported Wallets & Technical Specs
We work with most major Ethereum wallets:
Wallet | File/Backup Type | Encryption Standard |
---|---|---|
MyEtherWallet | JSON (AES-128-CTR) | scrypt (N=8192, r=8, p=1) |
ETH Presale Wallets | JSON (AES-128-CTR) | scrypt (N=262144, r=1, p=8) |
MetaMask | V3 Encrypted JSON | PBKDF2-SHA256 + AES-256-GCM |
Trezor/Ledger | 12/24-word BIP39 Seed | BIP39 Mnemonic + Optional Passphrase |
Exodus | seed.seco (Encrypted JSON) | AES-256 + PBKDF2 (100k iterations) |
Technical Deep Dive
- Brute-Force Attacks:
- GPU clusters optimized for scrypt/PBKDF2 to test millions of password candidates per second.
- Seed Phrase Recovery:
- BIP39 mnemonics with checksums allow combinatorial recovery of missing/incorrect words.
- Corruption Repair:
- Manual hex editing or script-based parsing to reconstruct valid JSON/encrypted payloads.