08-05-2020, 12:17 AM
we are very sceptical about identifying hashes with those tools just by doing some regular expressions.
They either provide just a too long list of possibilities or totally wrong / stupid results.
It's much more clever to understand which software generated them and have a look at the source code or documentation etc.
It doesn't make much sense to just try to guess the hashing algorithm and in most cases it's not an unknown if you know the software that generated it (and it shouldn't be a hide and seek game to obscure the details about the hashing algorithm or keep the algorithm secret, that's not how security works).
They either provide just a too long list of possibilities or totally wrong / stupid results.
It's much more clever to understand which software generated them and have a look at the source code or documentation etc.
It doesn't make much sense to just try to guess the hashing algorithm and in most cases it's not an unknown if you know the software that generated it (and it shouldn't be a hide and seek game to obscure the details about the hashing algorithm or keep the algorithm secret, that's not how security works).