neobyte Posted June 15, 2011 Posted June 15, 2011 I have been trying to reverse a SHA-512 hash with no luck. I have searched, but I cannot find any SHA-512 time-memory tradeoff tables or rainbow tables anywhere. Does anyone know where to find them? Quote
digip Posted June 15, 2011 Posted June 15, 2011 I think because of the hash creation process taking many variables, and the fact that you won't know how many times the phrase was hashed in rounds, as well as the salt used, its pretty much impossible without a brute force attack of plain text phrases being fed to the program doing the authentication. To get an idea of the possibilities, take a look at this site: http://blog.ricky-stevens.com/php-sha512-password-hashing/ You can have so many variables in place for creating the hash, between the number of rounds, and the randomness of the salt, you would need to know those two factors first before generating your tables to match that specific sites hashing configuration and the tables would only work in the instance in which you knew the salt phrase as well as the number of rounds it was hashed. It would be quicker to throw every word or phrase you can at the login/authentication process itself, until something on your list worked and let you in. Quote
Infiltrator Posted June 15, 2011 Posted June 15, 2011 (edited) You can use Hashcat to crack Sha-256 and Sha-512. Though you will need a Nvidia graphics card that supports CUDA architecture. http://hashcat.net/hashcat/#features-attackmodes Edited June 15, 2011 by Infiltrator Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.