Menu
Hi Guys!
Until yesterday I was under an impression that MD5 hashes cannot be reversed and is thus secured but then I found this site [url]http://www.md5decryption.com/
I am sure there are other sites that can decrypt other hash functions like sha1, tiger160, sha256 etc.
Please share your views about it?
Thanks
Md5 Hash: 10d5dfcdbbcdfa6fd266a02779b1d198
Sorry, this MD5 hash wasn't found in our database[/QUOTE]
How hard the hash may be to find text that does match is irrelevant since no matching text is going to serve any useful purpose.[/quote]
It seems almost impossible, though, I mean how would one go about finding a string that hashes the same?[/quote]It's a highly mathematical craft. To see an example, you can check how past hashes have been broken:
I would say that, with a team of 50 programmers, each monitoring a thousand supercomputers, that would still take a large number of years to find the correct string.. ?[/quote]You seem to be assuming a brute-force search. That's not how it would be done. If brute-forcing is the only option, then the algorithm is considered secure. Rather, attackers reverse engineer the algorithm to determine what input must have been fed to each part of the system to produce the given output.
It would be pretty useless if a text file had been hashed that you wanted to read.[/quote]Yes, that would be useless. Though, the case I described is very common to Web applications, and is nothing like this scenario.
And isn't the mathmatical restructuring of a hash what rainbow tables does?[/quote]A rainbow table is just a lookup table—a database of pre-computed hashes. So no.
Ever hear ofRainbow Tables ?
[/Quote]
the md5 after the . is something like the ip string that the user used the last time they accessed. or an md5 a string added to cookie on the client machine, or something.[/QUOTE]
0.1.9 — BETA 5.15