Interpreting some unlikely results.
#2
So...

You used the MD5 algorithm cracking, it found plains that, when hashed, lead to the original hash you were testing?

I think the tool is working fine.

It's HIGHLY unlikely that another hash algorithm would generate valid MD5s for a password-ish sequence of bytes.

Alternately, the leaked list was generated seeded with fake passwords. *shrug*


Messages In This Thread
Interpreting some unlikely results. - by 550tiguy - 07-17-2012, 06:49 PM
RE: Interpreting some unlikely results. - by Bitweasil - 07-17-2012, 07:51 PM