Fingerprint a Hashed Password with Hash-Identifier [Tutorial]

preview_player
Показать описание
How to Fingerprint Hashed Passwords

Cyber Weapons Lab, Episode 132

Hashes are a way to avoid storing passwords in plain-text. It's a common security feature that requires cracking or brute-forcing in order to obtain a password during an attack. But in order to go about doing this, a hacker or pentester would need to know what kind of hash they're dealing with. We'll show you how to fingerprint a hashed password, on this episode of Cyber Weapons Lab.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

I love your videos and I hate the new YouTube policy that prevents hacking tutorials.

Spencerk
Автор

Your OSINT videos pretty useful even for the professionals like us. Great keep up the splendid work.

karthibalaji
Автор

10:13 use `sudo !!` to repeat the previous command appending sudo to the beginning ;)

u-ux
Автор

I love your videos, they’re so amazing and help with learning, youre great man! Thanks for sharing and doing so well to teach us.

lunaticironclad
Автор

I have learned all my basic hacking skills by watching all null byte resources

gopalakrishnabs
Автор

How to extract the hashes in the first place?

thestylesworld
Автор

Hey, you're grate! I don't know if you have done it yet but, could you do a tutorial about how to set up a good proxychain in kali linux, or talk about the new kali linux 2019.4? Thank's

jjj-xesm
Автор

0:34 So, if it's "a way of storing information", I should be able to retrieve a 4 gig file from any length SHA digests, right? Seems like you're missing an important premise.

Inadharion
Автор

Great episode, adding this to toolkit

joseurena
Автор

This one is definitely useful Thank you very much! I had lots of that kind of passwords now I know how to decrypt them easly👍🏻👏🏻

TRAFFICMETIN
Автор

If guess if you were doing this real-world, you'd make sure there was an known entry in the database that you'd put there yourself before grabbing the database, to speed things along a little. Trying to brute force a hash is time-consuming, you wouldn't want to guess at the wrong one.

threeMetreJim
Автор

Can you explain how to find the hash from an encrypted USB. Thank you!

erikw
Автор

so hashes are no better than encryptions? What’s stopping anyone from bruteforcing through every algorithm and then bruteforcing the resulted passwords?

Kaiziak
Автор

hmm i have a question rn ( for what the hash is ?) i mean did u put a link then u got the hash for the person ?

mohammedalkaseer
Автор

hoe to identify a hashed password on an html code?

DarkEdgeStudio
Автор

lol :D i feel so unsafe now haha. Great video mate!

yunokawaii
Автор

Doesn’t john do this when you load up hashes?

JacquesAndre
Автор

Questions I'm new to this. Can you hide your IP when running Kali to connect directly to device. Say scanning WiFi for info or running nmap. Is there a video I missed or can you make one on it

jon_
Автор

I can't pin down what it is, but the start of every video is unsettling to me (and no, it's not the blinking). It's like the perfect mix between your relative explaining something informally and a news broadcast formally informing, but in the way that it's in a superposition, perfectly reflecting both states simultaneously.

userou-igze
Автор

Can i do that on android, i am also begginer at paython and can you help me how to learn fast or some website

v-rdays