Solved

How does a MD5 hash password field look like?

Posted on 2003-11-14
6
1,517 Views
Last Modified: 2011-10-03
Dear fellow experts,

My question is humble and simple:

How does a MD5 hashed password field look like?

Best of times!
/herrmann1001
0
Comment
Question by:herrmann1001
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 63 total points
Comment Utility
Here is how one looks like from a Linux MD5 hash:

{crypt}$1$32961293$T8fjH92IYWOEbEynWnCqY
0
 
LVL 9

Expert Comment

by:TooKoolKris
Comment Utility
Here is a website that will create a MD5 Hash for you right on the website:

MD5 hash calculator
http://bfl.rctek.com/tools/?tool=hasher
0
 
LVL 2

Assisted Solution

by:Jason_Deckard
Jason_Deckard earned 62 total points
Comment Utility
MD5 digests are 128-bits (16 bytes) long.  When represented with just 16 bytes, the digest often appears as "garbage" because parts of the digest may not map to printable characters.  For this reason, digests are often displayed in hex.

When displayed in hex, an MD5 digest appears to be 32 bytes long (because two characters are being used to represent one byte from the digest):

A59C4FEA39C3D781AEB28E194CA5D2EA


Regards,
Jason Deckard
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Is this error real? 2 41
Monitoring software... 2 44
How to disable this prompt, Windows 7 and IE 11.0? 18 94
Do we need servers??? 5 114
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now