- UID
- 121047
- 热情
- 19001
- 人气
- 23532
- 主题
- 263
- 帖子
- 14860
- 精华
- 23
- 积分
- 29120
- 分享
- 0
- 记录
- 0
- 相册
- 1
- 好友
- 153
- 日志
- 0
- 在线时间
- 24590 小时
- 注册时间
- 2007-6-21
- 阅读权限
- 30
- 最后登录
- 2023-10-23
![Rank: 17](static/image/common/star_level3.gif) ![Rank: 17](static/image/common/star_level3.gif) ![Rank: 17](static/image/common/star_level3.gif) ![Rank: 17](static/image/common/star_level3.gif) ![Rank: 17](static/image/common/star_level1.gif)
升级 ![](source/plugin/plbeautify/images/expl.gif) ![](source/plugin/plbeautify/images/expc.gif) 45.6% - UID
- 121047
- 热情
- 19001
- 人气
- 23532
- 主题
- 263
- 帖子
- 14860
- 精华
- 23
- 积分
- 29120
- 阅读权限
- 30
- 注册时间
- 2007-6-21
|
本帖最后由 Venox10111 于 2011-12-23 15:19 编辑
hopeman 发表于 2011-12-23 13:52 ![](static/image/common/back.gif)
那个网站看来跟csdn一样业余, 把Cisco 的MD5 hash 说成不是正确的MD5 HASH
看来还是骗了不少人, 让人真以 ...
CISCO md5 has seems to be different to the general MD5 hash (hence, it can be more scure in that way, it's type5)
Like what above floor mentioned, it is using a bruteforce way of matching and solving the MD5 cash called collision method. It is easy, if you have millions of password which majority of them are not high-strength password.
there's a tool for that and I havn't personally tried
http://membres.multimania.fr/mdcrack/
Don't get so "HOT" about when I am saying it's "EASY", I am merely saying, for that case, with million of user account leaked, even the password are encoded in general MD5(like what they do in this BBS) it's relatively "EASY" to retrive most of it |
|