Skip to content

Information Security -- How to hack a password. One particular use case for hashing is for user authentication. Given an original object (password, file, image, etc), the content is hashed into SHA1, or MD5, and stored in database. So, even the application could not revert a given hashed object to its original content. To authenticate, the user …

Notifications You must be signed in to change notification settings

hurricanemark/SHA-1-Password-Cracker

Repository files navigation

SHA-1 Password Cracker

Before we get into this, I just have one question: Why do most applications allow the user to commit their password creation while the password strength indicator showing 'weak'? This to me seems to defeat the purpose of putting in large efforts to strengthen security.

Okay. Let's !

hashlib.sha1 and hashlib.md5 are inherently weak. In fact, hackers have compiled several lists of frequently guessed passwords called the Rainbow Tables. One can convert each of these passwords into hash.sha1 and use it to compare with the hash objects stored in password database. Often with surprisingly high match rate.

How to hack a password

A note about SHA-1, MD-5. They are not encryption algorithms! Rather, they are hashing functions which is one-way ticket simply impossible to revert.

The use case for hashing is mainly for authentication, given an original object (password, file, image, etc), the content is hashed into SHA1, or MD5, else and stored in database. So, even the application could not revert a given hashed object to its original content. To authenticate, the user will supply an original object {password, file, image, etc}. the same hash routine is applied to produce a hashed object. This hashed object is compared with one stored in the database looking for a match.

Replit output

This solution can be mapped to Replit for demoing. freecodecamp -- Information Security Projects

Below is the runtime output from Replit.

on replit

Repository

I just keep the command lines here for my own interest. Don't mind me.

create a new repository on the command line
echo "# SHA-1-Password-Cracker" >> README.md
git init
git add README.md
git commit -m "first commit"
git branch -M main
git remote add origin https://github.com/hurricanemark/SHA-1-Password-Cracker.git
git push -u origin main

About

Information Security -- How to hack a password. One particular use case for hashing is for user authentication. Given an original object (password, file, image, etc), the content is hashed into SHA1, or MD5, and stored in database. So, even the application could not revert a given hashed object to its original content. To authenticate, the user …

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages