begood Posted June 10, 2009 Report Posted June 10, 2009 The idea of a cryptographic hash of a plaintext password is that you cannot 'reverse' or 'decrypt' the hash and in this way recover the original plaintext. One can only attempt to recover the plaintext password by trying many plaintexts and compare the resulting hashes to this hash (for example by regular brute forcing, dictionary attacks or by using rainbow tables). It is however possible to reverse part of the hash in such a way that a smaller part of the cryptographic algorithm has to be performed. The amount of steps that can be reversed, depends on the algorithm used. At least for MD5 an unlikely large amount of steps can be reversed. Several people have been working on reversing this algorithm and implementing these techniques into brute forcers. For example the GPU powered brute forcer BarsWF gains much speed because of the reversed steps.There is this one guy, Sc00bz, who actually wrote about reversing MD5 in detail, providing enough information for one to go and implement the reversing steps into for example a brute forcer. Later on he even provided some code snippets to work with.read more : http://blog.distracted.nl/2009/04/reversing-cryptographic-hash.htmlo explicatie mai completa pe hackpedia.info : http://hackpedia.info/viewtopic.php?f=139&p=85221#p85221am tradus cate una alta. Quote
nosferatu Posted June 10, 2009 Report Posted June 10, 2009 (edited) Interesant, nu doar acest articol,toatemerci Edited June 10, 2009 by nosferatu Quote
begood Posted June 11, 2009 Author Report Posted June 11, 2009 M-am gandit...daca tot ma retrag sa dau ceva inapoi forumului...Salutare oxy,unu,dranaxum....si restul care ma cunosc...btw daca are careva nevoie de tabele/audit la un hash, ma contactati. Quote