Leave a Reply 1

Your email address will not be published. Required fields are marked *


beetleman

beetleman

This always confuses me how MD5 is used as encryption as it is a hash algorithm and not an encryption algorithm.

You could potentially eavesdrop the hash from the original password exchange and then basically MD5 hash a brute force attack till you get the matching hash from the original password exchange.

Also, why is MD5 used as defaults for a number of cisco configurations but then they tell us to avoid it because its compromised.

Silly.