View Full Version : MD5 hash string
PoseidonX43
April 9th, 2011, 12:25 PM
can some one decript this beff0965b65cceb4a95a4e1f89310aab
and if this post is not on topic feel free to lock it
darkwoon
April 10th, 2011, 09:45 PM
can some one decript this beff0965b65cceb4a95a4e1f89310aab
and if this post is not on topic feel free to lock it
No. By definition, MD5 is a signature that cannot be reversed, except by a brute force method. Moreover, MD5 is not collision-resistant: it means that more than a single password can share the same MD5 hash.
anonymous.john
April 10th, 2011, 10:14 PM
No. By definition, MD5 is a signature that cannot be reversed, except by a brute force method. Moreover, MD5 is not collision-resistant: it means that more than a single password can share the same MD5 hash.
Current practical implementations of md5 do not exhibit the collisions due to common restraints on input, but in theory, you are correct.
You don't "decrypt" a hash like you would decrypt a coded language.
The only way you can find out what the source of an md5 hash is is through Brute Force. There's a program out there called "Cain and Abel" that can work on this for you, it might take 20 years to crack though if the password is well enough constructed.
Note that I don't condone the use of any software for illegal purposes, I'm assuming this is something educational. HTS maybe?
PoseidonX43
April 11th, 2011, 06:31 PM
Current practical implementations of md5 do not exhibit the collisions due to common restraints on input, but in theory, you are correct.
You don't "decrypt" a hash like you would decrypt a coded language.
The only way you can find out what the source of an md5 hash is is through Brute Force. There's a program out there called "Cain and Abel" that can work on this for you, it might take 20 years to crack though if the password is well enough constructed.
Note that I don't condone the use of any software for illegal purposes, I'm assuming this is something educational. HTS maybe?
it is edu
anonymous.john
April 12th, 2011, 09:10 PM
Your best bet for breaking an md5 is expending a lot of time and processing power generating these so-called "rainbow tables" that store lots of md5 hashes. Then you cross-reference the hash with the rainbow table and look for similar results. If you suspect the string that produced the hash is random, or unintelligible, your best bet is to use a bruteforce program like Cain and Abel.
PoseidonX43
April 16th, 2011, 03:43 PM
to be correct 10 yrs, i dont hav the time and paychences for that lol
vBulletin® v3.8.9, Copyright ©2000-2021, vBulletin Solutions, Inc.