RssA1: KrackoWorld

luni, 28 mai 2012

KrackoWorld

KrackoWorld


What is MD5 Hash and How to Use It ?

Posted: 27 May 2012 10:32 PM PDT

Today In this post, I am going to explain one of my favourite and interesting cryptographic algorithm called MD5 (Message-Digest algorithm 5). This algorithm is mainly used to perform file integrity checks under most circumstances. The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value. Specified in RFC 1321, MD5 has been employed in a wide variety of security applications, and is also commonly used to check data integrity. MD5 was designed by Ron Rivest in 1991 to replace an earlier hash function, MD4. An MD5 hash is typically expressed as a 32-digit hexadecimal number etc.

 

Security

The security of the MD5 hash function is severely compromised. A collision attack exists that can find collisions within seconds on a computer with a 2.6 GHz Pentium 4 processor (complexity of 224.1). Further, there is also a chosen-prefix collision attack that can produce a collision for two chosen arbitrarily different inputs within hours, using off-the-shelf computing hardware (complexity 239). The ability to find collisions has been greatly aided by the use of off-the-shelf GPUs. On an NVIDIA GeForce 8400GS graphics processor, 16–18 million hashes per second can be computed. An NVIDIA GeForce 8800 Ultra can calculate more than 200 million hashes per second.

These hash and collision attacks have been demonstrated in the public in various situations, including colliding document files and digital certificates.

Other vulnerabilities:

A number of projects have published MD5 rainbow tables online, that can be used to reverse many MD5 hashes into strings that collide with the original input, usually for the purposes of password cracking.

The use of MD5 in some websites' URLs means that search engines such as Google can also sometimes function as a limited tool for reverse lookup of MD5 hashes. Both these techniques are rendered ineffective by the use of a sufficiently long salt.


A MD5 hash is nothing but a 32 digit hexadecimal number which can be something as follows

A Sample MD5 Hash

e4d909c290d0fb1ca068ffaddf22cbd0

This hash is unique for every file irrespective of it's size and type. That means two .exe files with the same size will not have the same MD5 hash even though they are of same type and size. So MD5 hash can be used to uniquely identify a file.

How to use MD5 Hash to check the Integrity of Files?

Suppose you have a file called backup.tar on your server. Before you download, you need to generate MD5 hash for this file on your server. To do so use the following command.

For UNIX:

md5sum backup.tar

When you hit ENTER you'll see something as follows

e4d909c290d0fb1ca068ffaddf22cbd0

This is the MD5 hash for the file backup.tar. After you download this file onto your PC, you can cross check it's integrity by again re-generating MD5 hash for the downloaded file. If both the hash matches then it means that the file is perfect. Otherwise it means that the file is corrupt. To generate the MD5 hash for the downloaded file on your Windows PC use the following freeware tool

MD5 Summer (Click on the link to download)

Cheers and have fun! Please pass your valuable comments below regarding this topic…

Find Highly Skilled Computer Security Professionals at SageIO

Posted: 27 May 2012 02:29 PM PDT

demoYes i am talking about the worlds leading site named as SageIO used for matching the Computer Security Professionals with jobs issued by the businessmen's. Hence SageIO is committed to provide an free environment where small and medium sized businesses can access hard to find talent, and where larger businesses can access unique intellectual property in the computer security domain. We understand the unique dynamics of the Computer Security space, both offensive and defensive and that is why we know we can help you. Let us know if there is anything we can do to serve you.

SageIO for Businesses

We provide businesses with the ability to find real Computer Security Talent and the unique skills that go along with the professionals. We aim to make sure the talent on our site is top notch and have some filters in place to help ensure it is. Employers can securely pay Professionals through our Escrow system. By using Escrow Employers are guaranteed protection.

SageIO for Computer Security Professionals

We offer the opportunity to market your unique skills freeing you to work on your own schedule. You are highly sought after and you will be able to use this to your ability to command high wages and your own hours. We help provide this by giving you access to businesses willing to pay for your talent. Get started today!

SageIO Working:

How much does it cost?

SageIO is free to join for both employers and providers. SageIO deducts a 10% fee from the money paid to the provider.

How does it work for an employer?

You signup and post a project for what you are looking for. You then get to sit back and see bids come in from computer security professionals. If you would like to be more proactive you can also invite providers to bid on your project. You can send messages to the providers that bid on your project and you can ask them questions to interview them. Once you have found one you like you select them. After the selection process you create milestones and fund them. Your money is put into an Escrow account for your protection. Once you are satisfied with the work you release payment.

How does it work for a provider?

You signup and search for projects on the site. Once you find a project that you are qualified for you can submit a bid to the system.  If one of your proposals is accepted you will then will create milestones with the employer and agree upon them. Then the employer will fund escrow and you can begin your work. Once you have completed your work the funds will be released to you minus a 10% fee.

Payment terms:

Pay through Escrow

You put your payment in escrow and only release it when you are satisfied. Professionals are rated by other business to help you find truly world class talent. We make sure you are happy with the product you receive. Guaranteed.

So what are you waiting for? Lets get started now by registering yourself at here.
Other links:

1. For job posting, click here.

2. Apply for work at here.

Social media links:

Twitter

Facebook

LinkedIn

Google plus

That's it!

How to spy a Mobile Phone and Monitor a Remote PC

Posted: 27 May 2012 09:28 AM PDT

spy cell phones and monitor remote PCAre you curious about to know the back activities of your spouse, kids, friends or employees at Mobile or PC, If yes then you are at the right place as today i am going to tell you how? Now you can see their activities without getting physical touch in less than no time through 2 wonderful software's named as Sniperspy and Mobile-Spy etc. Please read the below tutorial for more details. Enjoy reading…

How to Monitor a Remote PC:

Read this Tut:

http://www.krackoworld.com/2011/01/hack-anyone-accounts-with-sniperspy.html

How to spy on a Cell phone:

Read this Tut:

http://www.krackoworld.com/2011/04/hack-accountsgps-locationssms-and-many.html

That's it!

Niciun comentariu:

Trimiteți un comentariu