![]() |
Been down the rabbit hole of Bitcoin key generation vulnerabilities lately. Ended up building a CLI tool to reproduce and analyze them. What it does:
```sh the classic brainwalletvuke single "correct horse battery staple" --transform sha256 check if a key is a Milksad victimvuke analyze --analyzer milksad <private_key> Covers: - Milksad (CVE-2023-39910) — libbitcoin's 32-bit MT19937 disaster - Brainwallets — SHA256(password), still being exploited - LCG/Xorshift PRNGs — glibc rand(), JS Math.random() - MultiBit HD, Electrum pre-BIP39, Armory Pure Rust, MIT license, optional GPU acceleration. GitHub: https://github.com/oritwoen/vuke Install: cargo install vuke One of my Bitcoin security research projects — also made kangaroo (https://github.com/oritwoen/kangaroo), boha (https://github.com/oritwoen/boha), and vgen (https://github.com/oritwoen/vgen) if you're into this stuff. For research/education only, obviously. Happy to chat about the vulns if anyone's curious. [link] [comments] |
from hacking: security in practice https://ift.tt/4H2oZck

Comments
Post a Comment