Solved

How does a MD5 hash password field look like?

Posted on 2003-11-14
6
1,550 Views
Last Modified: 2011-10-03
Dear fellow experts,

My question is humble and simple:

How does a MD5 hashed password field look like?

Best of times!
/herrmann1001
0
Comment
Question by:herrmann1001
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 9

Accepted Solution

by:
TooKoolKris earned 63 total points
ID: 9749013
Here is how one looks like from a Linux MD5 hash:

{crypt}$1$32961293$T8fjH92IYWOEbEynWnCqY
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9749049
Here is a website that will create a MD5 Hash for you right on the website:

MD5 hash calculator
http://bfl.rctek.com/tools/?tool=hasher
0
 
LVL 2

Assisted Solution

by:Jason_Deckard
Jason_Deckard earned 62 total points
ID: 9763003
MD5 digests are 128-bits (16 bytes) long.  When represented with just 16 bytes, the digest often appears as "garbage" because parts of the digest may not map to printable characters.  For this reason, digests are often displayed in hex.

When displayed in hex, an MD5 digest appears to be 32 bytes long (because two characters are being used to represent one byte from the digest):

A59C4FEA39C3D781AEB28E194CA5D2EA


Regards,
Jason Deckard
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question