Password cracking: Difference between revisions
Jump to navigation
Jump to search
Created page with "Steps required for password cracking software: # Identify the algorithm used. # Identify whether a salt is used. From these there are multiple stages: # If no salt is used..." |
No edit summary |
||
Line 1: | Line 1: | ||
Steps required for password cracking software: | Steps required for password cracking software: | ||
# Identify which columns contain the username and the password (hashed or otherwise). | |||
# Identify the algorithm used. | # Identify the algorithm used. | ||
# Identify whether a salt is used. | # Identify whether a salt is used. | ||
Line 7: | Line 8: | ||
# If no salt is used (e.g. plain MD5), consult a pre-computed lookup table. | # If no salt is used (e.g. plain MD5), consult a pre-computed lookup table. | ||
Identifying an algorithm: | |||
* Length: 32 characters is likely to be MD5. | |||
* Characters: 0-9a-zA-Z is likely to be MD5. |
Revision as of 16:14, 22 July 2018
Steps required for password cracking software:
- Identify which columns contain the username and the password (hashed or otherwise).
- Identify the algorithm used.
- Identify whether a salt is used.
From these there are multiple stages:
- If no salt is used (e.g. plain MD5), consult a pre-computed lookup table.
Identifying an algorithm:
- Length: 32 characters is likely to be MD5.
- Characters: 0-9a-zA-Z is likely to be MD5.