1 00:00:00,750 --> 00:00:06,630 In this video, we're going to talk about this hash identifying those teams, very important step in 2 00:00:06,630 --> 00:00:07,620 cracking the hatches. 3 00:00:07,800 --> 00:00:14,910 We need to identify whatever the hash it is, and we cannot guarantee that this hash might be exactly 4 00:00:14,910 --> 00:00:15,270 this. 5 00:00:15,330 --> 00:00:16,890 Uh, uh. 6 00:00:19,260 --> 00:00:25,830 I disagree, Tom, so these there are some clues in the current tracks, which are we going to see this 7 00:00:25,830 --> 00:00:26,220 video? 8 00:00:26,730 --> 00:00:32,640 They just analyze this pattern of the actions and they will decide, well, maybe these algorithms can 9 00:00:32,640 --> 00:00:41,000 be used to encrypt this plaintext password and then they will do some hashes. 10 00:00:41,190 --> 00:00:47,230 So I have this simple hash I have generated by using the online. 11 00:00:47,640 --> 00:00:49,570 Now I'm willing to go to the next machine. 12 00:00:49,600 --> 00:00:59,570 Now I'm going to use the hash identifier so these hashes will have some particular patterns of one hashing 13 00:00:59,580 --> 00:01:07,220 algorithm, may contain some more numbers than any rational and some may contain some special characters. 14 00:01:07,620 --> 00:01:11,910 And like that, there will be differences between these hashing algorithms. 15 00:01:12,090 --> 00:01:15,950 So there is a tool called Hash Identifier and need presenter. 16 00:01:16,950 --> 00:01:18,140 So this is what I can tell. 17 00:01:18,270 --> 00:01:22,970 What are you want to do is you want to push this year and hit enter. 18 00:01:23,160 --> 00:01:32,410 It will analyze and it will tell us that this hash might be of, uh, somehow just so you can see this 19 00:01:32,730 --> 00:01:40,020 or are the least possible hashes and main possible hashes are default and the domain kashrut credentials. 20 00:01:40,320 --> 00:01:44,310 So it can be also be a default, uh, logarithm. 21 00:01:45,180 --> 00:01:49,500 And if possible, if this does not work and you can try this one. 22 00:01:50,610 --> 00:01:55,680 So this is very basic and simple to measure and you can just simply parse the hash. 23 00:01:57,420 --> 00:02:03,190 So it might be a pair of hash out before this started of sorts as well. 24 00:02:03,360 --> 00:02:05,880 So this is one tool I shared for you. 25 00:02:06,900 --> 00:02:08,540 Now another one especially. 26 00:02:08,850 --> 00:02:10,780 So this is very straightforward. 27 00:02:10,890 --> 00:02:14,220 Need to parse the hash as, uh, argument. 28 00:02:14,970 --> 00:02:22,050 And if you enter it with analyzing this hash and it may be due to differ from before and before our 29 00:02:22,350 --> 00:02:24,710 password, uh, hash as well. 30 00:02:25,320 --> 00:02:32,070 So you can, uh, first, starting with the same data, you can try to brute force this using the some 31 00:02:32,070 --> 00:02:38,040 puzzle tools and you can also try a different default, wouldn't be fair, etc.. 32 00:02:38,160 --> 00:02:42,060 So this is the default hash I have generated using the online tool. 33 00:02:43,390 --> 00:02:45,610 And you can just simply try this. 34 00:02:46,360 --> 00:02:52,090 So these are very pretty basic tools to run for the highest and there are also the online tools. 35 00:02:52,450 --> 00:02:56,800 But I prefer online ironfist, because you do not have Internet all the time. 36 00:02:56,800 --> 00:02:57,050 Right. 37 00:02:57,250 --> 00:02:59,720 And these are pretty straightforward and easy to use. 38 00:03:00,340 --> 00:03:07,510 So I created this hash of a of using this same encryption tool and now I'm going to push it in here. 39 00:03:10,130 --> 00:03:14,610 So we have seen the harsh, unfair and harsher they have got some results. 40 00:03:14,840 --> 00:03:16,020 Now, let's see this one. 41 00:03:16,490 --> 00:03:18,440 This is Orrin Hatch, Crittercam. 42 00:03:19,650 --> 00:03:25,050 And you can see you have got the same output as well, so sometimes you'll get some different output 43 00:03:25,060 --> 00:03:26,880 boosted up on these different tools. 44 00:03:27,180 --> 00:03:32,610 But anyway, it's worth trying to do rather than depending on only one tool. 45 00:03:32,910 --> 00:03:37,370 So I highly recommend this Orrin Hatch dot com if you prefer to. 46 00:03:37,520 --> 00:03:46,920 So if you prefer this online on our Web site to identify agist and this is one of them and also also 47 00:03:46,920 --> 00:03:48,410 try for a Hasharon for.