Skip to content
logo infosecscout
  • Kali Linux – From Zero to Hero
  • ArticlesExpand
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
logo infosecscout

Security

How to Get an MD5 Hash in PowerShell?
Security

How to Get an MD5 Hash in PowerShell?

MD5 is a hashing algorithm, still popular despite the security issues. You can use it to encrypt a string or to get the fingerprint of a file. In this article, we’ll see how to use it in PowerShell. PowerShell offers a cmdlet to generate MD5 hash for a file: Get-FileHash. It can also be used…

Read More How to Get an MD5 Hash in PowerShell?Continue

MD5 vs SHA256: Which is Better? (Speed, Safety, …)
Security

MD5 vs SHA256: Which is Better? (Speed, Safety, …)

MD5 and SHA256 are two popular cryptographic algorithms, used to store sensitive data (passwords for example). In this article, we’ll see the difference between them, and which one you should use and why. As a whole, SHA-256 is better than MD5 because the output size is twice longer and the probability of collisions is lower….

Read More MD5 vs SHA256: Which is Better? (Speed, Safety, …)Continue

Regex Patterns Examples to Match MD5 Hashes in any Language
Security

Regex Patterns Examples to Match MD5 Hashes in any Language

If you are a developer, you know that regex are really useful to find or check something quickly. But usually, they are not really the easiest thing to do, especially if you are not sure of what you are looking for. That’s why I wrote this article, to give you the guidelines but also a…

Read More Regex Patterns Examples to Match MD5 Hashes in any LanguageContinue

How to Convert MD5 Passwords to SHA256?
Security

How to Convert MD5 Passwords to SHA256?

If you are still using MD5 to encrypt passwords in a database, it might be a right move to look for a better algorithm. SHA256 should be a good replacement, and the question today is to see how to migrate from MD5 to SHA256. As a general rule, MD5 is a hashing function, not an…

Read More How to Convert MD5 Passwords to SHA256?Continue

How to Easily Open an MD5 File? (Windows / Linux / macOS)
Security

How to Easily Open an MD5 File? (Windows / Linux / macOS)

Sometimes, when you download a file on the Internet (program, image, etc.), you might get another file with it, with a md5 file extension (ex: myfile.iso and myfile.iso.md5). If you don’t know what to do with this file, you’re at the good place, I’ll explain everything in this article. An MD5 file is generated to…

Read More How to Easily Open an MD5 File? (Windows / Linux / macOS)Continue

Why MD5 Cannot Be Decrypted? (and 3 solutions)
Security

Why MD5 Cannot Be Decrypted? (and 3 solutions)

The main goal of MD5 was to hide sensitive data like passwords by encrypting it in a database, so that even if the database is downloaded by someone, there is no way they can get all the passwords directly. The MD5 algorithm has been created especially to not have a reverse function. Why? MD5 is…

Read More Why MD5 Cannot Be Decrypted? (and 3 solutions)Continue

How to Set a MD5 Password in PHPMyAdmin?
Security

How to Set a MD5 Password in PHPMyAdmin?

The MD5 encryption algorithm is still one of the most used in the world, and specially in MySQL tables.In this tutorial, I’ll show you how it works in a database, and especially how to generate it easily with PHPMyAdmin. When inserting a new line with PHPMyAdmin, there is a dropdown menu on the left of…

Read More How to Set a MD5 Password in PHPMyAdmin?Continue

7 Ways to Generate a MD5 File Checksum (Windows and Android)
Security

7 Ways to Generate a MD5 File Checksum (Windows and Android)

Do you wonder how to generate a MD5 file checksum? You are at the best place, in this article, I’ll show you 7 methods to do this, so you’ll necessarily find one that works for you. As a general rule, the MD5 checksum for a file can be generated with a command line or third-party…

Read More 7 Ways to Generate a MD5 File Checksum (Windows and Android)Continue

What’s The Difference Between MD5 And SHA1?
Security

What’s The Difference Between MD5 And SHA1?

MD5 and SHA1 are often used following a random pick by the developer, but it’s not the same thingIn this post, I’ll introduce these two solutions and explain how they differ. The main difference between SHA1 and MD5 is that MD5 produces a 32-character message digest, while SHA1 produces a 40-character hexadecimal. Also, the MD5…

Read More What’s The Difference Between MD5 And SHA1?Continue

3 Reasons why MD5 is not Secure
Security

3 Reasons why MD5 is not Secure

You probably already read that information, and you know that MD5 is not the most secure hashing functionBut do you know why? Do you know safer alternatives?This is what I’ll explain you today. Why is MD5 not secure?MD5 is a cryptographic algorithm, often used to store passwords in a databaseBut this algorithm is no longer safeBrute force…

Read More 3 Reasons why MD5 is not SecureContinue

Page navigation

Previous PagePrevious 1 2 3 Next PageNext

Welcome

Hi, my name is Patrick, I'm a web developer and network administrator. I have always been interested in security, and I created this website to share my findings with you.

Time to level up!

Want to master Kali Linux like a pro?
I have a book and course available for you, that will guide you to install Kali Linux, configure it and discover the most useful tools included and how to use them the right way.

Learn more

Popular articles

  • How to use Wireshark on Kali Linux
  • How to open an MD5 file
  • Generate a MD5 checksum
  • How are passwords stored
  • MD5 vs SHA256

Latest articles

  • Mastering Netcat on Kali Linux: A beginner’s guide
  • Kali Linux Default Password: Default user, root & SSH tips
  • Getting Started with BeEF on Kali Linux: A Complete Guide
  • Python on Kali Linux: A beginner’s guide to get started
  • Kali Linux: How to Capture Screenshots Like a Pro
  • About Me
  • Privacy Policy
  • Terms and Conditions
  • Contact

© 2023 InfosecScout

Our website is supported by our users. We may earn a commission when you click through the affiliate links on our website.

  • Kali Linux – From Zero to Hero
  • Articles
    • Security
    • Hacking
    • Kali Linux
  • Other Resources
Search