cracking HMAC-SHA1 when the password and seed are inverted
I happen to have a few hashes generated with code that did this (it has been changed to use a more "standard" bcrypt call):
$ python3
>>> import hmac
>>> hmac.new(b’The quick brown’, b’123456′, digestmod=’sha1′)… Continue reading cracking HMAC-SHA1 when the password and seed are inverted