Jump to content

Reverse Sha-512 Hash


neobyte
 Share

Recommended Posts

I think because of the hash creation process taking many variables, and the fact that you won't know how many times the phrase was hashed in rounds, as well as the salt used, its pretty much impossible without a brute force attack of plain text phrases being fed to the program doing the authentication. To get an idea of the possibilities, take a look at this site: http://blog.ricky-stevens.com/php-sha512-password-hashing/

You can have so many variables in place for creating the hash, between the number of rounds, and the randomness of the salt, you would need to know those two factors first before generating your tables to match that specific sites hashing configuration and the tables would only work in the instance in which you knew the salt phrase as well as the number of rounds it was hashed. It would be quicker to throw every word or phrase you can at the login/authentication process itself, until something on your list worked and let you in.

Link to comment
Share on other sites

You can use Hashcat to crack Sha-256 and Sha-512. Though you will need a Nvidia graphics card that supports CUDA architecture.

http://hashcat.net/hashcat/#features-attackmodes

Edited by Infiltrator
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...