Solved

How does a MD5 hash password field look like?

Posted on 2003-11-14
6
1,560 Views
Last Modified: 2011-10-03
Dear fellow experts,

My question is humble and simple:

How does a MD5 hashed password field look like?

Best of times!
/herrmann1001
0
Comment
Question by:herrmann1001
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 63 total points
ID: 9749013
Here is how one looks like from a Linux MD5 hash:

{crypt}$1$32961293$T8fjH92IYWOEbEynWnCqY
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9749049
Here is a website that will create a MD5 Hash for you right on the website:

MD5 hash calculator
http://bfl.rctek.com/tools/?tool=hasher
0
 
LVL 2

Assisted Solution

by:Jason_Deckard
Jason_Deckard earned 62 total points
ID: 9763003
MD5 digests are 128-bits (16 bytes) long.  When represented with just 16 bytes, the digest often appears as "garbage" because parts of the digest may not map to printable characters.  For this reason, digests are often displayed in hex.

When displayed in hex, an MD5 digest appears to be 32 bytes long (because two characters are being used to represent one byte from the digest):

A59C4FEA39C3D781AEB28E194CA5D2EA


Regards,
Jason Deckard
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month7 days, 21 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question