如何解密 SHA-512 散列数据
How to decrypt SHA-512 hashed data
更新:
SHA-512 是单向的,所以我不需要尝试破解密码,因为简单地重设密码更容易。如果有人知道从 SHA-512 散列文本中获取原始密码,请告诉我。否则,我将从这个问题开始。谢谢大家的回答。
原问题:
I have read a lot of articles that state that SHA-512 hashing cannot be unhashed. However, there is a source code for the various SHA-1 + algorithms here: https://tls.mbed.org/sha-512-source-code.
I would like to know if it is possible to reverse this coding, in a way, to decrypt SHA-512 hashed text. Linux encrypts their passwords with SHA-512 hashing. As a systems administrator, I would prefer to simply decrypt or unhash this information as needed, rather than guessing whether a password is correct or incorrect and see if the hash matches. Creating new passwords can cause a lot of extra time and money. If you do not feel comfortable publishing this information and would like to discuss it privately, feel free to request my contact information.
谢谢!
您阅读的文章是正确的。
但是,例如,如果用户使用字典单词,而您没有对哈希值进行加盐处理,那么这些情况很容易受到字典攻击。这就是为什么没有人值得他们的盐,双关语 会使用没有盐的哈希算法。
坦率地说,我发现系统管理员不太可能需要获取密码,因为通常他们有模拟权限。
I have read a lot of articles that state that SHA-512 hashing cannot be unhashed.
是的。那就是"hash"的定义。这与 SHA-512 无关。哈希函数的定义是不可逆的。时期。如果可以反转就不是hash
I would like to know if it is possible to reverse this coding, in a way, to decrypt SHA-512 hashed text.
不,你不能解密它,因为它没有加密,它是散列的。
Linux encrypts their passwords with SHA-512 hashing.
不,不是。它对它们进行哈希处理,但不对其进行加密。
As a systems administrator, I would prefer to simply decrypt or unhash this information as needed, rather than guessing whether a password is correct or incorrect and see if the hash matches. Creating new passwords can cause a lot of extra time and money. If you do not feel comfortable publishing this information and would like to discuss it privately, feel free to request my contact information.
作为系统管理员,如果您不明白加密和散列的区别,请告诉我您在哪里工作,这样我永远不会不小心成为的客户你的!鸽笼原理简单明了,child.
都能看懂
为什么你不相信你读到的?
加密哈希函数无法逆转。
思维实验:你有 200 个字节传递给 SHA512,结果是 64 个字节。有些东西丢失了。你如何找回失去的东西?
以类似的方式,如果你有一个整数,比如说 123,并且 mod 乘以 10,结果将是 3。现在反过来 - 哦它本来可以是 3, 13, 23, 33 , 123, 9343453, *3.
更新:
SHA-512 是单向的,所以我不需要尝试破解密码,因为简单地重设密码更容易。如果有人知道从 SHA-512 散列文本中获取原始密码,请告诉我。否则,我将从这个问题开始。谢谢大家的回答。
原问题:
I have read a lot of articles that state that SHA-512 hashing cannot be unhashed. However, there is a source code for the various SHA-1 + algorithms here: https://tls.mbed.org/sha-512-source-code.
I would like to know if it is possible to reverse this coding, in a way, to decrypt SHA-512 hashed text. Linux encrypts their passwords with SHA-512 hashing. As a systems administrator, I would prefer to simply decrypt or unhash this information as needed, rather than guessing whether a password is correct or incorrect and see if the hash matches. Creating new passwords can cause a lot of extra time and money. If you do not feel comfortable publishing this information and would like to discuss it privately, feel free to request my contact information.
谢谢!
您阅读的文章是正确的。
但是,例如,如果用户使用字典单词,而您没有对哈希值进行加盐处理,那么这些情况很容易受到字典攻击。这就是为什么没有人值得他们的盐,双关语 会使用没有盐的哈希算法。
坦率地说,我发现系统管理员不太可能需要获取密码,因为通常他们有模拟权限。
I have read a lot of articles that state that SHA-512 hashing cannot be unhashed.
是的。那就是"hash"的定义。这与 SHA-512 无关。哈希函数的定义是不可逆的。时期。如果可以反转就不是hash
I would like to know if it is possible to reverse this coding, in a way, to decrypt SHA-512 hashed text.
不,你不能解密它,因为它没有加密,它是散列的。
Linux encrypts their passwords with SHA-512 hashing.
不,不是。它对它们进行哈希处理,但不对其进行加密。
As a systems administrator, I would prefer to simply decrypt or unhash this information as needed, rather than guessing whether a password is correct or incorrect and see if the hash matches. Creating new passwords can cause a lot of extra time and money. If you do not feel comfortable publishing this information and would like to discuss it privately, feel free to request my contact information.
作为系统管理员,如果您不明白加密和散列的区别,请告诉我您在哪里工作,这样我永远不会不小心成为的客户你的!鸽笼原理简单明了,child.
都能看懂为什么你不相信你读到的?
加密哈希函数无法逆转。
思维实验:你有 200 个字节传递给 SHA512,结果是 64 个字节。有些东西丢失了。你如何找回失去的东西?
以类似的方式,如果你有一个整数,比如说 123,并且 mod 乘以 10,结果将是 3。现在反过来 - 哦它本来可以是 3, 13, 23, 33 , 123, 9343453, *3.