Identify the hashing algorithm used in cryptographic hashes
Here are some examples of different hash types and their formats:
Algorithm | Example Hash | Length | Characteristics |
---|---|---|---|
MD5 | 5f4dcc3b5aa765d61d8327deb882cf99 | 32 chars | Hexadecimal, 128-bit |
SHA-1 | 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 | 40 chars | Hexadecimal, 160-bit |
SHA-256 | 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 | 64 chars | Hexadecimal, 256-bit |
SHA-512 | b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86 | 128 chars | Hexadecimal, 512-bit |
bcrypt | $2a$10$N9qo8uLOickgx2ZMRZoMy.Mwrjmj2U0mHh3kXZ5Pw6ZETMaGQ6tQq | 60 chars | Starts with $2a$, $2b$, $2y$ |
NTLM | 209c6174da490caeb422f3fa5a7ae634 | 32 chars | Hexadecimal, used in Windows |