![]() Would be better than md5 encryption, or even sha1. Our decrypter online database is coming from all the wordlist I was able to find on the internet. I then sorted them, and enlarge the final wordlistīy creating a script that multiplicated the list to finally lend to a unique and pertinent online md5 hashes list. Md5 is no longer considered as a secure way to store passwords. In 2004, chinese scientists found a complete collision on md5. Since that date, collisions becameĮasier and easier due to the increasing calculation power. If you are interested into md5 collisions and want It is now possible to find a md5 collision in a few minutes. It is now better to use hash functions such as Sha256, 512, bcrypt, scrypt, whirlpool for instance. If you still want to use md5 to encrypt passwords on your website, good thing would be to use a "salt" to make the hash more difficult to crack via bruteforce and rainbow tables.Ī salt is simply a caracters string that you add to an user password to make it less breakable. For instance, say we are using the password "password" (good idea). ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |