Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Quickly identify Hash encryption method hashid

2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Quickly identify Hash encryption method hashid

The hashid tool is used to identify different types of hash encryption, and then to determine the type of hash algorithm. The syntax format of the tool is as follows:

Hashid [option] INPUT

Where option represents an option, and some operations are done by specifying an option, which is optional. INPUT represents a hash value or a list file of hash values that need to be recognized. The options and meanings available to option in the syntax are shown in Table 7-1.

Table 7-1 available options and implications

-e

List all cryptographic hashing algorithms including salt

-m

Show the corresponding Hashcat hash algorithm coding

-j

Show the corresponding John hash algorithm name

-o

Save the output information to a file

Once you know these options and what they mean, you can use these options to identify different algorithms for hashes.

[example 7-1] A hash value is known to be 202cb962ac59075b964b07152d234b70. Let's use the hashid tool to identify the type of hash value, and execute the command as follows:

Root@daxueba:~# hashid 202cb962ac59075b964b07152d234b70

The output information is as follows:

Analyzing '202cb962ac59075b964b07152d234b70'

[+] MD2

[+] MD5

[+] MD4

[+] Double MD5

[+] LM

[+] RIPEMD-128

[+] Haval-128

[+] Tiger-128

[+] Skein-256

[+] Skein-512

[+] Lotus Notes/Domino 5

[+] Skype

[+] Snefru-128

[+] NTLM

[+] Domain Cached Credentials

[+] Domain Cached Credentials 2

[+] DNSSEC (NSEC3)

[+] RAdmin v2.x

From the first line of the output information, you can see that the hash value is being analyzed and identified, and the following output information is the possible type of hash algorithm after analysis.

When identifying hash values, you need to use the-e option if you want to list all the hash algorithms, including salt passwords. Its syntax format is as follows:

Hashid-e INPUT

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report