About 36,400 results
Open links in new tab
  1. I know hash and salt; how do I use hashcat to decrypt?

    hash: 341A451DCF7E552A237D49A63BFBBDF1 salt: 1234 I have a word bank I generated using CeWL that I think I am supposed to use. But when I run hashcat --force -a 0 -m ...

  2. John the Ripper is unable to crack my SHA1 hashed password

    Jul 11, 2021 · The syntax based on the information provided should be: galoget@hackem:~$ john -format:RAW-SHA1 -wordlist:rockyou.txt testing.txt Using default input encoding: UTF-8 Loaded 1 password hash (Raw-SHA1 [SHA1 256/256 AVX2 8x]) Warning: no OpenMP support for this hash type, consider --fork=8 Press 'q' or Ctrl-C to abort, almost any other key for status Warning: Only 1 candidate left, minimum 8 ...

  3. Is it possible to crack any SHA1 hashed password

    Jul 14, 2018 · SHA1 is perhaps the worst scenario for securing passwords - except for plaintext storage or schemes without salt. Password cracking tools not only test lists of passwords, but also replace individual letters, such as S with $, double letters, sample combinations of uppercase and lowercase letters for all passwords in the list, combine words, etc.

  4. Is using bcrypt on existing SHA1 hashes good enough when …

    Oct 22, 2015 · However instead of SHA1 we were using SHA256(password + salt) hashes originally. This salt is regenerated when we switch the user to bcrypt as they login (optional) or upon changing their password. So the hash wouldn't be based on the original.

  5. sha - Why can't we produce original text from sha1 if there is no ...

    Sep 25, 2021 · You are right about random table but what I can't understand is if it produces same hash number for same input it must follow some algorithm like A=1, B=2 etc and why can't we decrypt the algorithm get original text back.

  6. encryption - SHA, RSA and the relation between them

    SHA is the common name for a family of cryptographic hash functions.The very first member of that family was described under the name 'SHA' but was soon deprecated after a serious weakness was found in it; a fixed version was published under the name SHA-1 (the weak version is colloquially known as SHA-0).

  7. passwords - John The Ripper and PBKDF2-HMAC-SHA1

    Jul 25, 2020 · At this point, it sounds more likely that your method of generating PBKDF2-HMAC-SHA1 is the issue here. Have you tried your attack against a "known good" hash? Have you tried your attack against a "known good" hash?

  8. decryption - padding problem in sha-1 hashed password

    Nov 22, 2017 · For my own understanding of Websphere LTPA keys, I'm running this Java code, which works correctly when using the author's Base64 encoded, SHA1 hashed password: String ltpa3DESKey = "IpGJOdpSxV3J8...

  9. hash - Is hashing passwords with bcrypt and a constant salt more ...

    I've now switched the hash method from SHA1 to bcrypt as it is more secure, but that has presented an issue. Because bcrypt generates a different salt every time, the hash is always different meaning I can no longer use the generated hash to identify the user's data in the database, unless I force the app to use the same salt each time it ...

  10. breaking down RSA/ECB/OAEPWITHSHA-256ANDMGF1PADDING

    Maybe the Hash "option" in RSAES-OAEP-DECRYPT and MGF1 are supposed to be the same or maybe they're not, it is unclear to me. If they are then I guess when you have RSA/ECB/OAEPWITHSHA-256ANDMGF1PADDING that means sha256 should be used for both. But if they're not supposed to be the same then you …

Refresh