Skip to content
logo infosecscout
  • Kali Linux – From Zero to Hero
  • ArticlesExpand
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
logo infosecscout

Blog

How Are Passwords Stored? (5 Methods Used by Developers)
Security

How Are Passwords Stored? (5 Methods Used by Developers)

On each website where you enter your password, the website owner has to keep it in a way or another so that it can check your identity the next time you log in. Do you wonder how they memorize your password? Is it safe? I’ll answer your questions in this article. Developers have several methods…

Read More How Are Passwords Stored? (5 Methods Used by Developers)Continue

How do Hackers get Hashed Passwords?
Hacking

How do Hackers get Hashed Passwords?

It is a common thing to hear people complain of fraudsters hacking their accounts. One wonders how possible this is, since most people never reveal their passwords. For many, such acts lead to losing their funds, while others get locked out from their social media handles. But how do passwords get hacked in the first…

Read More How do Hackers get Hashed Passwords?Continue

What is a Rainbow Table? (MD5 Decryption Strategy)
Hacking

What is a Rainbow Table? (MD5 Decryption Strategy)

The MD5 algorithm is a one-way hash function, it’s not reversible, so there is no way to decrypt a MD5 hash “automatically”. However, current technologies allow us to use different strategies to crack MD5 hashes and find the original word. Using a rainbow table is one of them, and that’s what I’ll introduce in this…

Read More What is a Rainbow Table? (MD5 Decryption Strategy)Continue

Where is MD5 used? (Most common applications explained)
Security

Where is MD5 used? (Most common applications explained)

MD5 is a cryptographic hash function, that has many advantages like the speed to generate them and the almost irreversible algorithm. These have leaded the MD5 algorithm to be widely used in the past, but where is this function still used nowadays? The most common application of the MD5 algorithm is now to check files…

Read More Where is MD5 used? (Most common applications explained)Continue

Is MD5 Easy to Crack? (and how long does it really takes)
Hacking

Is MD5 Easy to Crack? (and how long does it really takes)

Many legends are discussed about the MD5 algorithm, but it’s time to break the myths and talk about real facts. Is the MD5 algorithm still safe to store passwords? That’s what we’ll see in this article. The MD5 algorithm is no longer considered safe to store passwords, as it’s coming more and more easy to…

Read More Is MD5 Easy to Crack? (and how long does it really takes)Continue

How to Do a MD5 Checksum on Windows? (No App Required)
Security

How to Do a MD5 Checksum on Windows? (No App Required)

MD5 is a hashing function that is often used to check if a file transfer is complete and the file has not been corrupted during it. On each system there are different tools you can use to a file checksum, and in this article we’ll see how to do this on Windows. On Windows 10,…

Read More How to Do a MD5 Checksum on Windows? (No App Required)Continue

How to Decrypt MD5 in JavaScript? (Solution with examples)
Hacking

How to Decrypt MD5 in JavaScript? (Solution with examples)

Cracking MD5 hashes is interesting for many people, and if you are programming in JavaScript you are at the perfect place. In this article, you’ll learn how to use MD5 in JavaScript and also how to decrypt MD5 hashes. The MD5 hash function works in one way only, there is no reverse function, whatever the…

Read More How to Decrypt MD5 in JavaScript? (Solution with examples)Continue

How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)
Security

How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)

That’s a common question when you work with hashes for the first time. I’m not (yet) native speaker in MD5, but I think I can help you to guess if a hash you have is a MD5 or not. The MD5 algorithm generate 128-bits long hashes, generally represented in a string of 32 hexadecimal characters….

Read More How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)Continue

Is MD5 Reversible? (Truth, Myths and Solutions)
Security

Is MD5 Reversible? (Truth, Myths and Solutions)

This is a common question with cryptographic algorithms (MD5, SHA1, etc.). The security issues with these algorithms often come from a misunderstanding of what they are and how they work. In this article, we’ll especially look at the MD5 algorithm and if it can be decrypted or not. As a general rule, the MD5 algorithm…

Read More Is MD5 Reversible? (Truth, Myths and Solutions)Continue

Can 2 Files Have the Same MD5 Hash? (and why)
Security

Can 2 Files Have the Same MD5 Hash? (and why)

The MD5 algorithm is often used to check large files (after a download for example). By comparing the MD5 output, we can tell if they are the same file or not. But is it possible to have the same MD5 hash for two different files? That’s what we’ll see in this article. Two files can…

Read More Can 2 Files Have the Same MD5 Hash? (and why)Continue

Page navigation

Previous PagePrevious 1 2 3 4 5 Next PageNext

Welcome

Hi, my name is Patrick, I'm a web developer and network administrator. I have always been interested in security, and I created this website to share my findings with you.

Time to level up!

Want to master Kali Linux like a pro?
I have a book and course available for you, that will guide you to install Kali Linux, configure it and discover the most useful tools included and how to use them the right way.

Learn more

Popular articles

  • How to use Wireshark on Kali Linux
  • How to open an MD5 file
  • Generate a MD5 checksum
  • How are passwords stored
  • MD5 vs SHA256

Latest articles

  • Mastering Netcat on Kali Linux: A beginner’s guide
  • Kali Linux Default Password: Default user, root & SSH tips
  • Getting Started with BeEF on Kali Linux: A Complete Guide
  • Python on Kali Linux: A beginner’s guide to get started
  • Kali Linux: How to Capture Screenshots Like a Pro
  • About Me
  • Privacy Policy
  • Terms and Conditions
  • Contact

© 2023 InfosecScout

Our website is supported by our users. We may earn a commission when you click through the affiliate links on our website.

  • Kali Linux – From Zero to Hero
  • Articles
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
Search
x