Lumaktaw sa pangunahing content

Different Types of Hashes and Strings


What Is a Hash?
Ok, firstly alot of you still believe that hashes can be "decrypted", this is a common misconception because hashes are generated by One Way Cryptographic Hash Algorithms these means the algorithm that created them CAN NOT be reversed to determine the plain text password.




These one way functions are used by computers to prevent storing passwords in plain text in memory, instead when a password is entered (for example at a log in screen) a one way hash algorithm is applied to the supplied password and then the hashed output is compared to the hash for that user, stored in memory. If the two hashes match, the passwords are the same and the user is authenticated, if the two hashes are not the same the passwords do not match and the user is denied access.

[+]Different Types of Hashes and How to Identify Them[+]
MD5 - The most common hash you will come across in the wild is an MD5 hash (Message-Digest algorithm)

These hashes are easily identified by the following factors:
  • They are always 32 characters in length (128 Bits)
  • They are always hexadecimal (Only use characters 0-9 and A-F)

Code:
Example -e906c5714b69671d95722103e4753554
 The Encrypted Code:Mryosojmlf

If the hash breaks one of these rules - IT IS NOT MD5.

SHA1 Still used frequently on the internet and is one of a large family of Secure Hash Algorithms.
These hashes are easily identified by the following factors:

  • They are always 40 Characters in length (160 bits)
  • They are always hexadecimal (Only use characters 0-9 and A-F)

Code:

Example - 9bbe96004afaf67cfc348a8792e6a69d926cab4d:Mryosojmlf
If the hash breaks one of these rules - IT IS NOT SHA1.

Hex-In mathematics and computing,hexadecimal (also base 16, or hex) is apositional numeral system with a radix, or base, of 16. It uses sixteen distinct symbols, most often the symbols 09 to represent values zero to nine, andA, B, C, D, E, F (or alternatively abcde,f) to represent values ten to fifteen.
3 Types of Hex 
(Hex)
(Hex Spaced)
(Hex Dashed)
(Hex Encoded for URL)

Hex: 
4d72796f736f6a6d6c66 :Mryosojmlf

Hex Spaced: 
4d 72 79 6f 73 6f 6a 6d 6c 66 :Mryosojmlf

Hex Dashed: 
4d-72-79-6f-73-6f-6a-6d-6c-66 :Mryosojmlf

Hex Encoded for URL: 
%4d%72%79%6f%73%6f%6a%6d%6c%66 :Mryosojmlf


BINARY-


A Binary Number is made up of only 0s and 1s.
110100
Example of a Binary Number
There is no 2, 3, 4, 5, 6, 7, 8 or 9 in Binary!

Mga Komento

Mga sikat na post sa blog na ito

Hiniling daw ni Kitty Duterte sa Pangulo na ipatanggal ang K-12 program

Hiniling daw ni Kitty Duterte sa Pangulo na ipatanggal ang K-12 program Manila Philippines, Hiniling umano ni Presidential Daughter Kitty Duterte sa kanyang ama na si Pangulong Rodrigo Duterte na ipatanggal ang K-12 program sa paaralan. Alamin at panoorin ang buong report mula sa news5. Panoorin ang video: Payag ba kayo na tanggalin ang K-12 program?

EARN BITCOIN

MALAKI NA HALAGA NG BITCOIN SA PHP KAYA EARN NA :) 1 BITCOIN = 500,000+Php HEY BTC AND SATOSHI EARNERS! HERE IS MY MOST TRUSTED, LEGIT SITE'S AND APP'S  TO EARN. 3 APP's FOR EARNING BITCOIN FREE 1,000 SATOSHI IF YOU USE MY CODE ' 2DVRYJ' >  https://play.google.com/store/apps/details?id=com.claimbitcoinnetwork.sst >  https://play.google.com/store/apps/details?id=com.claimbitcoinnetwork.wos >  https://play.google.com/store/apps/details?id=tech.jplabs.bitcoin EARN LOAD USING MESSENGER > m.me/neargroup?ref=R_II6ig1 FREE 300PHP UPON SIGN UP > https://affiliate.paysbook.co/auth/register?id=Mryosojmlf EARN BITCOIN,LITECOIN,DOGECOIN,DASH COIN MAIN SITE:  coinpot.co FAUCET SITE'S: > http://moonbit.co.in/?ref=8e315d2026b4 (BITCOIN) > http://moondoge.co.in/?ref=7d9dbc153226 (DOGECOIN) > http://moonliteco.in/?ref=7b7bb9509913 (LITECOIN) > http://moondash.co.in/?ref=87DACF2841DD (DASH) > http://moonb.ch/?ref=62497...

Ano ang Google Dorks?

Ang Google(Gogol) Google.com  ay isang Napakalaking pinag kukunan ng impormasyon na nakikita sa 'Surface Web.' Isa na rin dito ay ang Google Dorking's. Ano nga ba ang Google Dorking? -Laman nito ay ang mga "features" para sa mas malalim,mabilis at masusing pag-hahanap. -Ang kailangan mo lang dito ay ang "KEYWORD" o ang "MAIN IDEA" hindi mo kailangan kompleto ang i Type mo. -isa siyang malalamin na pag sasaliksik madalas na ang mga gumagamit nito ay ang mga Hackers,Pentesters,Security Researchers, atbp. SQLI DORK EXAMPLE •index.php?url= MP3 Download or Play Example •intitle:index of alone by Alan Walker You can Use the following words instead of INURL: •intitle: •inurl: •intext: •site: ANY SUGGESTION AND QUESTION ABOUT GOOGLE DORKINGS? COMMENT DOWN AND KINDLY SHARE.