md5 – POFTUT

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list … Read more

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to authenticate. Message is checked against … Read more

What Is OpenSSL Library?

OpenSSL is most popular open source cryptography library which provides a lot of tools, libraries, algorithms about cryptography. It is mostly known with Secure Socket Layers (SSL) and Transport Layer Security (TLS) protocols. Supported Encryption Algorithms Encryption is used to make given data unreadable by the intruders. It is mainly used for confidentiality. OpenSSL supports … Read more

Python Hash Strings and Lists to MD5, SHA256, SHA512 with Hashlib Module

Security is important part of the today IT and gains more respect from IT world. Hashing is a security measure to protect and check our data. In this tutorial we will look how to use hash with tables and strings. What is Hash Hash is a function where provided data will be converted into another … Read more

How To Install and Configure Openssl Suite On Windows

OpenSSL is very popular security library and tool. OpenSSL provides a lot of security algorithms, standards, protocols as library and tool. OpenSSL mainly developed in the Free software and Linux community but this doesn’t mean Windows do not use OpenSSL library and tools. In this tutorial we will learn how to install and configure OpenSSL … Read more

How To Crack Password with John The Ripper Incremental Mode

This is the most powerful cracking mode. Keep in mind that generally cracking will never end in this mode if there is no password because combinations are too large. Configurations about Incremental Mode can be found in configuration file [Incremental:MODE] section. $ john –incremental unshadowed –incremental is used to specify incremental Mode Set Only Numeric Chars for … Read more

How To Crack Password John The Ripper with Wordlist

Word list mode is the simplest cracking mode. We need to specify the word list.  The specified word list will we mangled according to default rules. Which means the words in the word list will be changed for usage. Word list should not contain duplicates which will bring down efficiency. To make thing more efficient … Read more

How To Crack Passwords with John The Ripper with GUI

Hackers preferred mode for tool usage is cli. John is developed for cli primarily. But there is also a gui part and can be installed like below. We named is johnny $ apt-get install johnny -y We can provide login and password hashes like below     We can select password hash type manually but … Read more