MD5 (Message-Digest algortihm 5) is cryptographic hash function to wide according to hash value 128-bit. The internet standart (RFC 1321), MD5 use do all sorts of things in secure applications, and MD5 use also to exam integrity a bundle.
okeyy...let's go to practices :
1. open terminal
2. type in terminal 'findmyhash MD5 -h teks_md5' > enter'
Happy Hacking
Daftar Blog Saya
Senin, 31 Agustus 2015
Selasa, 11 Agustus 2015
Cracking Password Winrar
We frequently use zipped files due to its small size and strong
encryption algorithm. These zipped files comes with a facility of
password protection which maintains the security of the files.
But sometimes this security feature turns into a drawback if we somehow forget the password. In that case the password cracker play their role. You can also use them if you downloaded a zipped file with password protection on it.
In my last article, if you followed then we learned to make a bootable USB of backtrack. So here I'm gonna introduce a tool which is present in Backtrack and if you have no past experience with Linux then no issues you can start from here. The open source tool we are gonna use is called fcrackzip.
fcrackzip is a fast password cracker partly written in assembler. It is able to crack password protected zip files with brute force or dictionary based attacks, optionally testing with unzip its results.
But sometimes this security feature turns into a drawback if we somehow forget the password. In that case the password cracker play their role. You can also use them if you downloaded a zipped file with password protection on it.
In my last article, if you followed then we learned to make a bootable USB of backtrack. So here I'm gonna introduce a tool which is present in Backtrack and if you have no past experience with Linux then no issues you can start from here. The open source tool we are gonna use is called fcrackzip.
fcrackzip is a fast password cracker partly written in assembler. It is able to crack password protected zip files with brute force or dictionary based attacks, optionally testing with unzip its results.
Langganan:
Postingan (Atom)