Just to clarify Rick, the MD5 is not strictly speaking an encryption
algorithm. It's a hashing algorithm, hashes by their very nature are
intended to be one way and destructive.
There are only a finite number of possible results of the MD5 hash, which
is how people have constructed tools to "decr
Brute forcing MD5 hashes is really only going to work if you are still
using weak passwords to begin with and just hashing them. This then works
in exactly the same way as a brute force dictionary attack on a plain
password, except they try the hashed version of the same password.
You should alway
Just for reference. Here's a pretty good article on how to hash properly.
https://crackstation.net/hashing-security.htm
Hashing is often done incorrectly, even if it's being salted you never want
to use the same salt across the board. Simple thing is, compute power is so
available, brute forcing
:
>
> So basically MD5 is useless if you can't decrypt the value! That sucks.
>
> Kind regards,
>
> Rick
>
> -Original Message-
> From: Dave Watts [mailto:dwa...@figleaf.com]
> Sent: Thursday, March 12, 2015 9:57 AM
> To: cf-talk
> Subject: Re: Decry
).
>
> Hashes have all sorts of uses!
>
> -Original Message-
> From: Dave Watts [mailto:dwa...@figleaf.com]
> Sent: Thursday, March 12, 2015 9:09 AM
> To: cf-talk
> Subject: Re: Decrypting MD5
>
>
> > So basically MD5 is useless if you can't decrypt the val
ginal Message-
From: Dave Watts [mailto:dwa...@figleaf.com]
Sent: Thursday, March 12, 2015 9:09 AM
To: cf-talk
Subject: Re: Decrypting MD5
> So basically MD5 is useless if you can't decrypt the value! That sucks.
I don't know about useless. Hashing is not the same as encryption.
> So basically MD5 is useless if you can't decrypt the value! That sucks.
I don't know about useless. Hashing is not the same as encryption.
They're intended to solve different problems.
Let's say you're using a Windows network, with Active Directory.
Active Directory doesn't actually know your
> So basically MD5 is useless if you can't decrypt the value! That sucks.
Maybe, if you're storing data you need to retrieve. Generally I use if for
data I need to compare (like passwords), then I just encrypt the values the
same way and compare the encrypted values.
Robert Harrison
Full Stack
It looks like you can if you know the salt:
http://www.hashkiller.co.uk/md5-decrypter.aspx
http://www.md5online.org/
http://md5decryption.com/
http://www.md5decrypter.com/
Robert Harrison
Full Stack Developer
AIMG
rharri...@aimg.com
Main Office: 704-321-1234 ext.118
Direct Line: 516-302-
So basically MD5 is useless if you can't decrypt the value! That sucks.
Kind regards,
Rick
-Original Message-
From: Dave Watts [mailto:dwa...@figleaf.com]
Sent: Thursday, March 12, 2015 9:57 AM
To: cf-talk
Subject: Re: Decrypting MD5
> I want to know if I can decrypt p
> I want to know if I can decrypt passwords stored as MD5 in a SQL Server
> database using the Decrypt
> function? There are online tools out there that decrypt MD5 so I'm hoping
> that I can do this in CF.
There are no tools that actually decrypt MD5 hashes, to the best of my
knowledge. MD5 is
Hey all sorry if this has been asked before. I did Google and didn't come up
with a result.
I want to know if I can decrypt passwords stored as MD5 in a SQL Server
database using the Decrypt function? There are online tools out there that
decrypt MD5 so I'm hoping that I can do this in CF. Tha
12 matches
Mail list logo