Hashes are commonly used to store sensitive information like credentials to avoid storing them in plaintext. With tools like Hashcat, it’s possible to crack these hashes, but only if we know the algorithm used to generate the hash. Using a tool called hash-identifier, we can easily fingerprint any hashes to discover the right Hashcat mode to use to retrieve a password.

Aside from cracking hashes, hash-identifier is also helpful for identifying which hashing algorithm is being used to provide a checksum value for a download. And it can be used to determine what program a hashed file or value… more


Go to Source

 

Comments are closed.