SHA256 vs MD5 in johntheripper
Does the SHA256 provide any advantages over MD5 for protection against the type of dictionary attack performed by John The Ripper? Why or why not?
Collaborate Disseminate
Does the SHA256 provide any advantages over MD5 for protection against the type of dictionary attack performed by John The Ripper? Why or why not?
I want to test how long it would take someone to brute force my password with a sha512 hash. The password would look like this:
date %random% hello %random%
2020-02-02 “abcthisisrandom” hello “abcthisisrandom”
Given that format, the se… Continue reading Brute force hashed password with known format
I download a .iso file and its sha256. I verified it and it was fine. After I mounted it in order to install it to Virtual Machine I check it again and the sha256 had been changed.
Was the .iso file be modified it? What I miss?
In the case of FDE, I understand that the user defined password is ran through a hashing algorithm such as SHA-512 (often with a random SALT and a high iteration count to act as a countermeasure for rainbow table and brute f… Continue reading Hashed password vs key, full-disk encryption
Can anyone help me to find out what type of hash this is? I have it in this form:
{SHA}vv359MeXQ+GgsEFZpf0No4HXxCg=
But I don’t think it is simply SHA1
I’ve tried to decode it with an sha1 decryptor on some websites, but t… Continue reading What type of hash is this?
If I have the MD5 and SHA1 hash matches for an encrypted container. Is there no possibility it’s been modified?
Is it safe to assume the container has never been modified?
I am currently working on a crypto challenge. Here I need to brute force a password. It’s SHA512 and the salt is given. But for some reason I can’t load the salt + hash into JTR because it’s complaining about the salt.
This … Continue reading John the ripper not working with dashes in the salt
We have a scenario where we need to prevent two users from using the same identifier. The identifier is sensitive (e.g. a social security number), so we do not want to store it in our DB. We just want to store some sort of ha… Continue reading Detect duplicates without exposing underlying data
Say I have a SHA-512 hash of some data.
How could I get a float from the hash? (With JavaScript)
The only solution I’ve found so far is to extract all the numbers in the hash and convert that to a float. (Prone to last digit… Continue reading What is a good way to derive a float from a hash?
I tried to find a similar question but I did not find a question describing my exact scenario and I am still puzzled if the following actually makes an application more secure.
I have legacy passwords stored with SHA1 and a … Continue reading Does it increase security to hash a SHA1 hash with a common salt with SHA256 with individual salt