Page 1 of 2 12 LastLast
Results 1 to 10 of 20

Thread: password hash

  1. #1
    Join Date
    Jul 2005
    Posts
    223
    Thanks
    12
    Thanked 0 Times in 0 Posts

    Default password hash

    i have a password from a user on mymessage board but it is hashed, 2f2cb8e0b7aae3c36e164b7a795207c9

    how can i figure out what it is, for non malicious purposes
    My Web Site
    Japan Town

  2. #2
    Join Date
    Jun 2005
    Location
    英国
    Posts
    11,876
    Thanks
    1
    Thanked 180 Times in 172 Posts
    Blog Entries
    2

    Default

    You can't -- that's the point of a hash
    Twey | I understand English | 日本語が分かります | mi jimpe fi le jbobau | mi esperanton komprenas | je comprends français | entiendo español | tôi ít hiểu tiếng Việt | ich verstehe ein bisschen Deutsch | beware XHTML | common coding mistakes | tutorials | various stuff | argh PHP!

  3. #3
    Join Date
    Jul 2005
    Posts
    223
    Thanks
    12
    Thanked 0 Times in 0 Posts

    Default

    twey!!! long time no see. and from what im reading about hased, it cant be decrypted, but it is possible to find out what the word is
    My Web Site
    Japan Town

  4. #4
    Join Date
    Jun 2005
    Location
    英国
    Posts
    11,876
    Thanks
    1
    Thanked 180 Times in 172 Posts
    Blog Entries
    2

    Default

    Only if someone's already stored it and its original text (and they haven't, at least publically, I already checked the common public rainbow tables).
    Twey | I understand English | 日本語が分かります | mi jimpe fi le jbobau | mi esperanton komprenas | je comprends français | entiendo español | tôi ít hiểu tiếng Việt | ich verstehe ein bisschen Deutsch | beware XHTML | common coding mistakes | tutorials | various stuff | argh PHP!

  5. #5
    Join Date
    Mar 2006
    Location
    Illinois, USA
    Posts
    12,164
    Thanks
    265
    Thanked 690 Times in 678 Posts

    Default

    Brute force. If you MUST know, just write a program that will run through until it finds it.
    that's the only way unless it's already been stored.
    Also, you'll need to know the algorithm. It's likely md5, but it would be sha1, md4, or several other things. The system might also have a trick in use, like using md5 on the md5 hash, etc.
    Daniel - Freelance Web Design | <?php?> | <html>| español | Deutsch | italiano | português | català | un peu de français | some knowledge of several other languages: I can sometimes help translate here on DD | Linguistics Forum

  6. #6
    Join Date
    May 2007
    Location
    USA
    Posts
    373
    Thanks
    2
    Thanked 4 Times in 4 Posts

    Default

    Ask the user?
    Trinithis

  7. #7
    Join Date
    Oct 2006
    Location
    미네소타, 미국
    Posts
    158
    Thanks
    0
    Thanked 1 Time in 1 Post

    Default

    Quote Originally Posted by Trinithis View Post
    Ask the user?
    best bet
    The only person I think is cool is -==INSERT YOUR NAME HERE==-

  8. #8
    Join Date
    Jun 2005
    Location
    英国
    Posts
    11,876
    Thanks
    1
    Thanked 180 Times in 172 Posts
    Blog Entries
    2

    Default

    Brute force. If you MUST know, just write a program that will run through until it finds it.
    If it hasn't found it in any of the common rainbow tables, which have been running for several years on a wide network of distributed machines, I doubt that's an option
    Twey | I understand English | 日本語が分かります | mi jimpe fi le jbobau | mi esperanton komprenas | je comprends français | entiendo español | tôi ít hiểu tiếng Việt | ich verstehe ein bisschen Deutsch | beware XHTML | common coding mistakes | tutorials | various stuff | argh PHP!

  9. #9
    Join Date
    Mar 2006
    Location
    Illinois, USA
    Posts
    12,164
    Thanks
    265
    Thanked 690 Times in 678 Posts

    Default

    Aren't those based on user input of specific passwords?

    For example, "sdafjkl23432" probably isn't in there, right? Using brute force would find even the weird possible passwords.

    If they have been running brute force and it isn't in the table, then that's very weird. I suppose it's either quite long or using characters that aren't usually checked.
    Daniel - Freelance Web Design | <?php?> | <html>| español | Deutsch | italiano | português | català | un peu de français | some knowledge of several other languages: I can sometimes help translate here on DD | Linguistics Forum

  10. #10
    Join Date
    Jun 2005
    Location
    英国
    Posts
    11,876
    Thanks
    1
    Thanked 180 Times in 172 Posts
    Blog Entries
    2

    Default

    Aren't those based on user input of specific passwords?
    Some of them are, some aren't.
    If they have been running brute force and it isn't in the table, then that's very weird. I suppose it's either quite long or using characters that aren't usually checked.
    It doesn't have to be that long -- they'd only got up to about eight characters last I checked.
    Twey | I understand English | 日本語が分かります | mi jimpe fi le jbobau | mi esperanton komprenas | je comprends français | entiendo español | tôi ít hiểu tiếng Việt | ich verstehe ein bisschen Deutsch | beware XHTML | common coding mistakes | tutorials | various stuff | argh PHP!

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •