Password cracking: Difference between revisions

From Rixort Wiki
Jump to navigation Jump to search
Created page with "Steps required for password cracking software: # Identify the algorithm used. # Identify whether a salt is used. From these there are multiple stages: # If no salt is used..."
 
No edit summary
Line 1: Line 1:
Steps required for password cracking software:
Steps required for password cracking software:


# Identify which columns contain the username and the password (hashed or otherwise).
# Identify the algorithm used.
# Identify the algorithm used.
# Identify whether a salt is used.
# Identify whether a salt is used.
Line 7: Line 8:


# If no salt is used (e.g. plain MD5), consult a pre-computed lookup table.
# If no salt is used (e.g. plain MD5), consult a pre-computed lookup table.
Identifying an algorithm:
* Length: 32 characters is likely to be MD5.
* Characters: 0-9a-zA-Z is likely to be MD5.

Revision as of 16:14, 22 July 2018

Steps required for password cracking software:

  1. Identify which columns contain the username and the password (hashed or otherwise).
  2. Identify the algorithm used.
  3. Identify whether a salt is used.

From these there are multiple stages:

  1. If no salt is used (e.g. plain MD5), consult a pre-computed lookup table.

Identifying an algorithm:

  • Length: 32 characters is likely to be MD5.
  • Characters: 0-9a-zA-Z is likely to be MD5.