MD5 Hash - What is this?


What is MD5 Hask. How can I find MD5 for a file?

Thank you in advance

Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

criptology (or something like this)
used for make (normally) systems more safe

imagine you do have a database with many users informations.
if someone exploit this system, he may see all the content of this database, including users passwords and emails. if this password is cryptographed in md5, he won't know what is the pass.

anyway, there ways to pass by this. like bruteforce(many combinations for finding the real string), rainbowtable (i think thats the name, its a table [normally in database] with many combinations of md5 hashes, so, the hacker may find the encrypted password in only one query)

see how it works (on login systems):

sign up:
login-name: aulto
password: aulto123

in the database, it will be:
login-name: ault
password: somemd5hash (course its not so)

in the verification:

input: aulto, aulto123
it will crypt the aulto123 and search in database for aulto,somemd5hash.

i have not too many time for explaining it better.
but i think you'll can understand

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
JohnBusiness Consultant (Owner)Commented:
From the perspective of a file, a number of sites / vendors provide MD5 hash details for the file you want to download. For example, VMware Workstation 7 is over 1/2 Gb to download. You want to know that the download was correct. You run DigestIt on the download, input the MD5 has, and DigestIt verifies the file.

DigestIt is readily available as a free download and comes in 32-bit and 64-bit versions.

... Thinkpads_User
Simply, a hash (SHA1, MD5..etc) is a fixed length string. It is produced when a specific operation is done on a file to calculate its hash. The hash is used to ensure the integrity of a file. So, if hashes are calculated for two files having identical contents except the second file has just . (dot) at the end, they would have different hashes.

For more info:

You can get a hash (MD5) calculator here:
Dear Adsayaa,

Check out Microsoft's "Availability and description of the File Checksum Integrity Verifier utility" article about FCIV, which is a great/free to for calculating MD6, SHA etc.:

I use the tool for calculating checksums, to ensure integrity of files.

Kind reagrds,
Rich RumbleSecurity SamuraiCommented:
File names have no bearing on the hash, but the rest of the above is correct. Renaming and or copying a file will result in the same hash for that file(s). An MD5 hash is a one-way operation, meaning that given the hash, one could never "reverse" it and recreate the original source. Brute force can be used, where you attempt to use plain-text files or strings, pass them through MD5 and see if they match.
For example. abcd = E2FC714C4727EE9395F324CD2E7F331F in MD5... there is no other way to make "E2FC714C4727EE9395F324CD2E7F331F" back into abcd... one has to type "abcd" and hash it to see they match. With files brute-force is much much harder... so the MD5 hash of the file can tell you if the file you have has been messed with by comparing the hash the author publishes with the hash you derive from your download. If one small thing changes inside a file, a extra space, changing the case of one single letter, the hash changes completely.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
OS Security

From novice to tech pro — start learning today.