当给定起始值和加密的最终值时找出MD5盐
当我有起始值和最终加密值时,有没有一种方法可以找出使用的盐?
Is there a method to find out the salt used when I have the starting value and the end encrypted value?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(4)
是的:暴力破解。
破解单个密码和破解单个盐/密码组合之间实际上没有任何区别。
Yes: brute force.
There's not really any difference between cracking a single password and cracking a single salt/password combination.
盐必须存储在某个地方。大多数时候,盐值只是简单地添加到加密值之前,以便验证代码具有验证质询密码是否散列为相同值所需的一切。
另一方面,盐可能存储在无法访问的地方,例如用户配置文件信息。
The salt must be stored somewhere. Most of the time, the salt value is simply prepended to the encrypted value, so that the validation code has everything it needs to verify that a challenge password hashes to the same value.
On the other hand, it is possible that the salt is stored somewhere inaccessible, such as with the user profile information.
暴力或利用已知的弱点就是这样。
问题是,您实际上不知道起始值,因为加密的是与盐连接的数据。 在许多情况下
(例如密码),盐实际上比加密的数据长,因此您实际上只知道进入算法的数据的一小部分。
Brute force or exploitation of known weaknesses is about it.
The thing is, you really don't know the starting value since what gets encrypted is the data concatenated with the salt. Something along the lines of
In many cases (such as passwords) the salt is actually longer than the data being encrypted, so you actually only know a small part of the data going into the algorithm.
建议您不要这样做,因为这在您所在的州可能是非法活动,但您可以随时查看 Message Digest 5 加密的标准文档。
Recommend you do not do it as it may be illegal activity in your state but you could always check the standards documentation for Message Digest 5 encryption.