Skip to content
logo infosecscout
  • ArticlesExpand
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
logo infosecscout

Blog

What is a Rainbow Table? (MD5 Decryption Strategy)
Hacking

What is a Rainbow Table? (MD5 Decryption Strategy)

The MD5 algorithm is a one-way hash function, it’s not reversible, so there is no way to decrypt a MD5 hash “automatically”. However, current technologies allow us to use different strategies to crack MD5 hashes and find the original word. Using a rainbow table is one of them, and that’s what I’ll introduce in this…

Read More What is a Rainbow Table? (MD5 Decryption Strategy)Continue

Where is MD5 used? (Most common applications explained)
Security

Where is MD5 used? (Most common applications explained)

MD5 is a cryptographic hash function, that has many advantages like the speed to generate them and the almost irreversible algorithm. These have leaded the MD5 algorithm to be widely used in the past, but where is this function still used nowadays? The most common application of the MD5 algorithm is now to check files…

Read More Where is MD5 used? (Most common applications explained)Continue

Is MD5 Easy to Crack? (and how long does it really takes)
Hacking

Is MD5 Easy to Crack? (and how long does it really takes)

Many legends are discussed about the MD5 algorithm, but it’s time to break the myths and talk about real facts. Is the MD5 algorithm still safe to store passwords? That’s what we’ll see in this article. The MD5 algorithm is no longer considered safe to store passwords, as it’s coming more and more easy to…

Read More Is MD5 Easy to Crack? (and how long does it really takes)Continue

How to Do a MD5 Checksum on Windows? (No App Required)
Security

How to Do a MD5 Checksum on Windows? (No App Required)

MD5 is a hashing function that is often used to check if a file transfer is complete and the file has not been corrupted during it. On each system there are different tools you can use to a file checksum, and in this article we’ll see how to do this on Windows. On Windows 10,…

Read More How to Do a MD5 Checksum on Windows? (No App Required)Continue

How to Decrypt MD5 in JavaScript? (Solution with examples)
Hacking

How to Decrypt MD5 in JavaScript? (Solution with examples)

Cracking MD5 hashes is interesting for many people, and if you are programming in JavaScript you are at the perfect place. In this article, you’ll learn how to use MD5 in JavaScript and also how to decrypt MD5 hashes. The MD5 hash function works in one way only, there is no reverse function, whatever the…

Read More How to Decrypt MD5 in JavaScript? (Solution with examples)Continue

How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)
Security

How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)

That’s a common question when you work with hashes for the first time. I’m not (yet) native speaker in MD5, but I think I can help you to guess if a hash you have is a MD5 or not. The MD5 algorithm generate 128-bits long hashes, generally represented in a string of 32 hexadecimal characters….

Read More How to Know if a Hash is a MD5? (Vs SHA1 and SHA256)Continue

Is MD5 Reversible? (Truth, Myths and Solutions)
Security

Is MD5 Reversible? (Truth, Myths and Solutions)

This is a common question with cryptographic algorithms (MD5, SHA1, etc.). The security issues with these algorithms often come from a misunderstanding of what they are and how they work. In this article, we’ll especially look at the MD5 algorithm and if it can be decrypted or not. As a general rule, the MD5 algorithm…

Read More Is MD5 Reversible? (Truth, Myths and Solutions)Continue

Can 2 Files Have the Same MD5 Hash? (and why)
Security

Can 2 Files Have the Same MD5 Hash? (and why)

The MD5 algorithm is often used to check large files (after a download for example). By comparing the MD5 output, we can tell if they are the same file or not. But is it possible to have the same MD5 hash for two different files? That’s what we’ll see in this article. Two files can…

Read More Can 2 Files Have the Same MD5 Hash? (and why)Continue

How to Decrypt MD5 in Java?  (Real Solution with Code Sample)
Hacking

How to Decrypt MD5 in Java? (Real Solution with Code Sample)

Everybody wants a solution to decrypt MD5 hashs, and Java programmers are also interested 🙂In this article, you’ll learn how to do this, and also discover a few things about the MD5 algorithm. The MD5 cryptographic algorithm only works one way. It’s possible to crypt a word into MD5 with Java, but there is no…

Read More How to Decrypt MD5 in Java? (Real Solution with Code Sample)Continue

How to Get an MD5 Hash in PowerShell?
Security

How to Get an MD5 Hash in PowerShell?

MD5 is a hashing algorithm, still popular despite the security issues. You can use it to encrypt a string or to get the fingerprint of a file. In this article, we’ll see how to use it in PowerShell. PowerShell offers a cmdlet to generate MD5 hash for a file: Get-FileHash. It can also be used…

Read More How to Get an MD5 Hash in PowerShell?Continue

Page navigation

Previous PagePrevious 1 2 3 4 5 6 Next PageNext

Welcome

Hi, my name is Patrick, I'm a web developer and network administrator. I have always been interested in security, and I created this website to share my findings with you.

Popular articles

  • How to use Wireshark on Kali Linux
  • How to open an MD5 file
  • Generate a MD5 checksum
  • How are passwords stored
  • MD5 vs SHA256

Latest articles

  • Disk Partitioning on Kali Linux: A beginner’s guide
  • 50 Basic Linux Commands you Need to Know on Kali Linux
  • How To Change DNS Servers On Kali Linux (GUI & Commands)
  • How To Login As Root On Kali Linux? (GUI & SSH)
  • Time Synchronization on Kali Linux (GUI & Commands)
  • About Me
  • Privacy Policy
  • Terms and Conditions
  • Contact

© 2023 InfosecScout

Our website is supported by our users. We may earn a commission when you click through the affiliate links on our website.

  • Articles
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
Search