how to decrypt this password hash? -


i had googled lot decryption useless can please tell me type of encryption , how decrypt 0x010056049b0e92e4e85487c8a63385cdb89bdd66cb7f28cab34e

for more info

password hash: 0x010056049b0e92e4e85487c8a63385cdb89bdd66cb7f28cab34e header: 0x0100 salt: 56049b0e mixedcase: 92e4e85487c8a63385cdb89bdd66cb7f28cab34e

can teach me how survive m totally new

if password owner doesn't work company may running afoul of law if continue down path. careful ensure know if violating law , make appropriate decision whether or not so. not advocate breaking law, , provide publicly available information, below, general educational purposes.

not wanting change password wanting learn suspicious. if have business accessing data password protects, have access change password, or know password. wanting keep password unchanged, learn , gain access underlying assets begs question: why leave unchanged? 1 obvious answer prevent rightful owner knowing have access. obvious answer because forgot password , trying regain access own data - though unusual have access hash not ability change password if 1 rightful owner.



as commenters have mentioned, cannot decrypt hash. hashing , encyrption/decryption 2 separate operations. encryption , decryption opposites, while hashing has no opposite function.

for simplicity's sake, consider encryption adding 1 each character, "a" in original text becomes "b", "b" in original text becomes "c", , on. decryption subtracting 1 number, "b" in cipher text becomes "a". in reality, harder math problems used, general idea.

hashing doesn't have inverse. consider hashing finding mod 2 result. example, "a" represented value "97", , 97 mod 2 = 1. "b" represented value "98" , 98 mod 2 = 0. shown table below...

letter  numeric            mod 2          representation      (the 'hash')          97             1  b         98             0  c         99             1  d        100             0  e        101             1 

as can see table, there's no way original letter knowing hash value. in reality, hashes more complex, based on harder math, , designed prevent collisions - avoiding scenario in description mod2 every "odd" letter results in "1" , every "even" letter results in "0".

nonetheless, should clear cannot reverse hash can reverse (decrypt) encryption.

that said, there ways find out password. might "brute force" every possible input until expected result. is, try salt password "a", "aa", "aaa", "aaa", ..., "b", "bb", ..., "ab", ... hash algorithm, fastest way figure out particular hash. however, hash algorithm , sufficiently long password, won't able learn password way before sun dies out.

sometimes hash algorithms have weaknesses. sometimes, there method faster brute forcing. you'd need particular algorithm in use , learn weaknesses, doesn't mean possible break in reasonable time. i'll leave exercise reader, , not responding requests pointers :)

finally, easier attempting reverse hash learn password way. realistically, strong hash algorithm intended force - it's supposed hard learn original password have resort technique. example, if person uses password works company, ceo can ask them password. more often, real goal gain control on valid account, can change current password.

that's of answer can give, given vagueness of question. if interested in more, talk lawyer , start reading wikipedia articles. job of explaining encryption , hashing , related algorithms.


Comments

Popular posts from this blog

SPSS keyboard combination alters encoding -

Add new record to the table by click on the button in Microsoft Access -

CSS3 Transition to highlight new elements created in JQuery -