E
Education
Newbie
I need a sha 512 decrypted can anyone do it for me?
Try http://cmd5.org/ it has everything.I need a sha 512 decrypted can anyone do it for me?
Lol if it is salted probably not in the next 700 years.Ill try that out right now,thanks!
You won't be able to decrypt it.I need a sha 512 decrypted can anyone do it for me?
lol that site is pathetic, you cant decrypt hashes, especially not sha512, its more hash inputs and hope to get the same output or lookup a table. but because of the size of a sha512 hash you would need a table with 1.34x10^154 different hashes to find a match. To put it in other words, if every single computer on earth was working together, the sun would still burn out way before one would be able to create an input to match the output, provided the initial input was secure enough. Long story short, all those websites are fakeTry http://cmd5.org/ it has everything.
Unless a computer got lucky and got it on the first trylol that site is pathetic, you cant decrypt hashes, especially not sha512, its more hash inputs and hope to get the same output or lookup a table. but because of the size of a sha512 hash you would need a table with 1.34x10^154 different hashes to find a match. To put it in other words, if every single computer on earth was working together, the sun would still burn out way before one would be able to create an input to match the output, provided the initial input was secure enough. Long story short, all those websites are fake
computers dont work on luck, then would attempt to crack by using a starting value, lets say a, then cycling through possibilities for 1 char e.g. a, b, c, d. then move onto 2 chars and go aa, ab, ac, ad...ba, bb, bc etc etc. that way they know they get everypossibility, but considering there are 255 possible characters for a password(exluding the null char) then removing things like CR, LF. say there a 200 different characters that can be inputted with a keyboard. and say the password length is known at 20(very secure) chars long, thats still 1.04 x10^46, and that still would only work if you knew the hash and the hashing algorithm usedUnless a computer got lucky and got it on the first try
What you could do (I think, not my field of study), is start by choosing random passwords, and they must start at length 20. If that were the case they could get 1.04x10^46 lucky and get it on the first trycomputers dont work on luck, then would attempt to crack by using a starting value, lets say a, then cycling through possibilities for 1 char e.g. a, b, c, d. then move onto 2 chars and go aa, ab, ac, ad...ba, bb, bc etc etc. that way they know they get everypossibility, but considering there are 255 possible characters for a password(exluding the null char) then removing things like CR, LF. say there a 200 different characters that can be inputted with a keyboard. and say the password length is known at 20(very secure) chars long, thats still 1.04 x10^46, and that still would only work if you knew the hash and the hashing algorithm used
problem with doing random is they would repeat chances and not cover all optionsWhat you could do (I think, not my field of study), is start by choosing random passwords, and they must start at length 20. If that were the case they could get 1.04x10^46 lucky and get it on the first try
You could have a set of all possible hashes, then have every hash tested removed from that set. This would enable a random-ish test method; however, it would be computationally less efficient, but perhaps statistically more efficient.problem with doing random is they would repeat chances and not cover all options
yeah, you cant really decrypt something that is known for being a one way algorithmYou could have a set of all possible hashes, then have every hash tested removed from that set. This would enable a random-ish test method; however, it would be computationally less efficient, but perhaps statistically more efficient.
Still, it would take forever.