Algorithms supported, responsibly
OnlineHashCrack supports a wide range of cryptographic algorithms used in real-world environments, from legacy systems to modern, industry-recommended schemes.
Our goal is not maximal coverage, but responsible coverage. Each supported algorithm has been carefully selected based on:
- Its prevalence in production systems
- Its relevance for security audits, incident response, and forensics
- Guidance from NIST and CISA
Algorithm classifications on this page are aligned with current guidance from the NIST SP 800-131A and NIST SP 800-57. These references are used to distinguish deprecated, legacy, and approved cryptographic mechanisms in the context of risk assessment and migration planning.
How algorithm access tiers work
-
Tier 1 – Legacy & Educational (Limited)
Deprecated or legacy algorithms that are widely documented and publicly crackable. Limited usage for learning, compatibility checks, and legacy system audits. -
Tier 2 – Professional Standard (Verified)
Algorithms commonly encountered in professional security work. Requires minimal verification to ensure responsible use. -
Tier 3 – Audit / Forensics Only
Full-capability access to modern, sensitive, or high-impact algorithms. Reserved for verified professionals performing authorized audits, IR, or forensics.
Tier 1 algorithms are supported specifically to help identify and migrate away from weak cryptography.
| Algorithm | Tier | NIST classification | Authorized use | Typical environment | Sample |
|---|---|---|---|---|---|
|
NTLM
Operating System |
Tier 1 |
Deprecated |
Use for NTLM algorithm
|
Environment
|
Sampleb4b9b02e6f09a9bd760f388b67351e2b
|
|
MD5
Raw Hash |
Tier 1 |
Deprecated |
Use for MD5 algorithm
|
Environment
|
Sample8743b52063cd84097a65d1633f5c74f5
|
|
md5(utf16le($pass))
Raw Hash |
Tier 1 |
Deprecated |
Use for md5(utf16le($pass)) algorithm
|
Environment
|
Sample2303b15bfa48c74a74758135a0df1201
|
|
md5(md5($pass))
Raw Hash salted |
Tier 1 |
Deprecated |
Use for md5(md5($pass)) algorithm
|
Environment
|
Samplea936af92b0ae20b1ff6c3347a72e5fbe
|
|
SHA1
Raw Hash |
Tier 1 |
Deprecated |
Use for SHA1 algorithm
|
Environment
|
Sampleb89eaac7e61417341b710b727768294d0e6a277b
|
|
sha1(utf16le($pass))
Raw Hash |
Tier 2 |
Deprecated |
Use for sha1(utf16le($pass)) algorithm
|
Environment
|
Sampleb9798556b741befdbddcbf640d1dd59d19b1e193
|
|
RIPEMD-160
Raw Hash |
Tier 1 |
Legacy Use |
Use for RIPEMD-160 algorithm
|
Environment
|
Sample012cb9b334ec1aeb71a9c8ce85586082467f7eb6
|
|
MySQL323
Database Server |
Tier 1 |
Deprecated |
Use for MySQL323 algorithm
|
Environment
|
Sample7196759210defdc0
|
|
MySQL
Database Server |
Tier 2 |
Legacy Use |
Use for MySQL algorithm
|
Environment
|
Samplefcf7c1b8749cf99d88e5f34271d636178fb5d130
|
|
phpass
CMS |
Tier 2 |
Legacy Use |
Use for phpass algorithm
|
Environment
|
Sample$P$984478476IagS59wHZvyQMArzfx58u.
|
|
SHA2-224
Raw Hash |
Tier 2 |
Approved |
Use for SHA2-224 algorithm
|
Environment
|
Samplee4fa1555ad877bf0ec455483371867200eee89550a93eff2f95a6198
|
|
SHA2-384
Raw Hash |
Tier 2 |
Approved |
Use for SHA2-384 algorithm
|
Environment
|
Sample07371af1ca1fca7c6941d2399f3610f1e392c56c6d73fddffe38f18c430a2817028dae1ef09ac683b62148a2c8757f42
|
|
SHA2-256
Raw Hash |
Tier 2 |
Approved |
Use for SHA2-256 algorithm
|
Environment
|
Sample127e6fbfe24a750e72930c220a8e138275656b8e5d8f48a98c3c92df2caba935
|
|
SHA2-512
Raw Hash |
Tier 2 |
Approved |
Use for SHA2-512 algorithm
|
Environment
|
Sample82a9dda829eb7f8ffe9fbe49e45d47d2dad9664fbb7adf72492e3c81ebd3e29134d9bc12212bf83c6840f10e8246b9db54a4859b7ccd0123d86e5872c1e5082f
|
|
MSSQL (2012, 2014)
Database Server |
Tier 2 |
Approved |
Use for MSSQL (2012, 2014) algorithm
|
Environment
|
Sample0x02000102030434ea1b17802fd95ea6316bd61d2c94622ca3812793e8fb1672487b5c904a45a31b2ab4a78890d563d2fcf5663e46fe797d71550494be50cf4915d3f4d55ec375
|
|
Cisco Type 7
Raw Hash |
Tier 1 |
Deprecated |
Use for Cisco Type 7 algorithm
|
Environment
|
Sample02031C5A06160324
|
|
sha1($pass.$salt)
Raw Hash salted |
Tier 2 |
Deprecated |
Use for sha1($pass.$salt) algorithm
|
Environment
|
Sample2fc5a684737ce1bf7b3b239df432416e0dd07357:2014
|
|
sha1($salt.$pass)
Raw Hash salted |
Tier 2 |
Deprecated |
Use for sha1($salt.$pass) algorithm
|
Environment
|
Samplecac35ec206d868b7d7cb0b55f31d9425b075082b:5363620024
|
|
sha512($pass.$salt)
Raw Hash salted |
Tier 2 |
Approved |
Use for sha512($pass.$salt) algorithm
|
Environment
|
Samplee5c3ede3e49fb86592fb03f471c35ba13e8d89b8ab65142c9a8fdafb635fa2223c24e5558fd9313e8995019dcbec1fb584146b7bb12685c7765fc8c0d51379fd:6352283260
|
|
sha512($salt.$pass)
Raw Hash salted |
Tier 2 |
Approved |
Use for sha512($salt.$pass) algorithm
|
Environment
|
Sample976b451818634a1e2acba682da3fd6efa72adf8a7a08d7939550c244b237c72c7d42367544e826c0c83fe5c02f97c0373b6b1386cc794bf0d21d2df01bb9c08a:2613516180127
|
|
sha256($pass.$salt)
Raw Hash salted |
Tier 2 |
Approved |
Use for sha256($pass.$salt) algorithm
|
Environment
|
Sample5bb7456f43e3610363f68ad6de82b8b96f3fc9ad24e9d1f1f8d8bd89638db7c0:12480864321
|
|
sha256($salt.$pass)
Raw Hash salted |
Tier 2 |
Approved |
Use for sha256($salt.$pass) algorithm
|
Environment
|
Sample816d1ded1d621873595048912ea3405d9d42afd3b57665d9f5a2db4d89720854:36176620
|
|
sha256(sha256($pass).$salt)
Raw Hash salted |
Tier 2 |
Approved |
Use for sha256(sha256($pass).$salt) algorithm
|
Environment
|
Samplebfede293ecf6539211a7305ea218b9f3f608953130405cda9eaba6fb6250f824:7218532375810603
|
|
md5($pass.$salt)
Raw Hash salted |
Tier 1 |
Deprecated |
Use for md5($pass.$salt) algorithm
|
Environment
|
Sample01dfae6e5d4d90d9892622325959afbe:7050461
|
|
md5($salt.$pass)
Raw Hash salted |
Tier 1 |
Deprecated |
Use for md5($salt.$pass) algorithm
|
Environment
|
Samplef0fda58630310a6dd91a7d8f0a4ceda2:4225637426
|
|
md5($salt.$pass.$salt)
Raw Hash salted |
Tier 1 |
Deprecated |
Use for md5($salt.$pass.$salt) algorithm
|
Environment
|
Sample2e45c4b99396c6cb2db8bda0d3df669f:1234
|
|
Apple Secure Notes
Document |
Tier 1 |
Legacy Use |
Use for Apple Secure Notes algorithm
|
Environment
|
Sample$ASN$*1*20000*80771171105233481004850004085037*d04b17af7f6b184346aad3efefe8bec0987ee73418291a41
|
|
MS Office 2007
Document |
Tier 1 |
Approved |
Use for MS Office 2007 algorithm
|
Environment
|
Sample$office$*2007*20*128*16*411a51284e0d0200b131a8949aaaa5cc*117d532441c63968bee7647d9b7df7d6*df1d601ccf905b375575108f42ef838fb88e1cde
|
|
MS Office 2010
Document |
Tier 1 |
Approved |
Use for MS Office 2010 algorithm
|
Environment
|
Sample$office$*2010*100000*128*16*77233201017277788267221014757262*b2d0ca4854ba19cf95a2647d5eee906c*e30cbbb189575cafb6f142a90c2622fa9e78d293c5b0c001517b3f5b82993557
|
|
MS Office 2013
Document |
Tier 1 |
Approved |
Use for MS Office 2013 algorithm
|
Environment
|
Sample$office$*2013*100000*256*16*7dd611d7eb4c899f74816d1dec817b3b*948dc0b2c2c6c32f14b5995a543ad037*0b7ee0e48e935f937192a59de48a7d561ef2691d5c8a3ba87ec2d04402a94895
|
|
MS Office <= 2003 MD5
Document |
Tier 1 |
Deprecated |
Use for MS Office <= 2003 MD5 algorithm
|
Environment
|
Sample$oldoffice$1*04477077758555626246182730342136*b1b72ff351e41a7c68f6b45c4e938bd6*0d95331895e99f73ef8b6fbc4a78ac1a
|
|
MS Office <= 2003 SHA1
Document |
Tier 1 |
Deprecated |
Use for MS Office <= 2003 SHA1 algorithm
|
Environment
|
Sample$oldoffice$3*83328705222323020515404251156288*2855956a165ff6511bc7f4cd77b9e101*941861655e73a09c40f7b1e9dfd0c256ed285acd
|
|
NetNTLM v1
Network Protocol |
Tier 2 |
Deprecated |
Use for NetNTLM v1 algorithm
|
Environment
|
Sample::5V4T:ada06359242920a500000000000000000000000000000000:0556d5297b5daa70eaffde82ef99293a3f3bb59b7c9704ea:9c23f6c094853920
|
|
MS Cache, DCC
Operating System |
Tier 2 |
Deprecated |
Use for MS Cache, DCC algorithm
|
Environment
|
Sample4dd8965d1d476fa0d026722989a6b772:3060147285011
|
|
MS Cache 2, DCC2
Operating System |
Tier 3 |
Legacy Use |
Use for MS Cache 2, DCC2 algorithm
|
Environment
|
Sample$DCC2$10240#tom#e4e938d12fe5974dc42a90120bd9c90f
|
|
Oracle S: Type (Oracle 11+)
Database Server |
Tier 2 |
Approved |
Use for Oracle S: Type (Oracle 11+) algorithm
|
Environment
|
Sample63ec5f6113843f5d229e2d49c068d983a9670d02:57677783202322766743
|
|
NetNTLM v2
Network Protocol |
Tier 3 |
Approved |
Use for NetNTLM v2 algorithm
|
Environment
|
Sample0UL5G37JOI0SX::6VB1IS0KA74:ebe1afa18b7fbfa6:aab8bf8675658dd2a939458a1077ba08:010100000000000031c8aa092510945398b9f7b7dde1a9fb00000000f7876f2b04b700
|
|
md5crypt
Operating System |
Tier 2 |
Deprecated |
Use for md5crypt algorithm
|
Environment
|
Sample$1$38652870$DUjsu4TTlTsOe/xxZ05uf/
|
|
sha256crypt
Operating System |
Tier 2 |
Approved |
Use for sha256crypt algorithm
|
Environment
|
Sample$5$7777657035274252$XftMj84MW.New1/ViLY5V4CM4Y7EBvfETaZsCW9vcJ8
|
|
sha512crypt
Operating System |
Tier 2 |
Approved |
Use for sha512crypt algorithm
|
Environment
|
Sample$6$52450745$k5ka2p8bFuSmoVT1tzOyyuaREkkKBcCNqoDKzYiJL9RaE8yMnPgh2XzzF0NDrUhgrcLwg78xs1w5pJiypEdFX/
|
|
descrypt
Operating System |
Tier 2 |
Deprecated |
Use for descrypt algorithm
|
Environment
|
Sample48c/R8JAv757A
|
|
bcrypt
Operating System |
Tier 2 |
Approved |
Use for bcrypt algorithm
|
Environment
|
Sample$2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6
|
|
iTunes backup >= 10.0
Archive |
Tier 1 |
Legacy Use |
Use for iTunes backup >= 10.0 algorithm
|
Environment
|
Sample$itunes_backup$*10*8b715f516ff8e64442c478c2d9abb046fc6979ab079007d3dbcef3ddd84217f4c3db01362d88fa68*10000*2353363784073608264337337723324886300850*10000000*425b4bb4e200b5fd4c66979c9caca31716052063
|
|
iTunes backup < 10.0
Archive |
Tier 1 |
Deprecated |
Use for iTunes backup < 10.0 algorithm
|
Environment
|
Sample$itunes_backup$*9*b8e3f3a970239b22ac199b622293fe4237b9d16e74bad2c3c3568cd1bd3c471615a6c4f867265642*10000*4542263740587424862267232255853830404566**
|
|
Kerberos 5, e23, TGS-REP
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e23, TGS-REP algorithm
|
Environment
|
Sample$krb5tgs$23$*user$realm$test/spn*$63386d22d359fe42230300d56852c9eb$891ad31d09ab89c6b3b8c5e5de6c06a7f49fd559d7a9a3c32576c8fedf705376cea582ab5938f7fc8bc741acf05c5990741b36ef4311fe3562a41b70a4ec6ecba849905f2385bb3799d92499909658c7287c49160276bca0006c350b0db4fd387adc27c01e9e9ad0c20ed53a7e6356dee2452e35eca2a6a1d1432796fc5c19d068978df74d3d0baf35c77de12456bf1144b6a750d11f55805f5a16ece2975246e2d026dce997fba34ac8757312e9e4e6272de35e20d52fb668c5ed
|
|
Kerberos 5, e23, AS-REP
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e23, AS-REP algorithm
|
Environment
|
Sample[email protected]:3e156ada591263b8aab0965f5aebd837$007497cb51b6c8116d6407a782ea0e1c5402b17db7afa6b05a6d30ed164a9933c754d720e279c6c573679bd27128fe77e5fea1f72334c1193c8ff0b370fadc6368bf2d49bbfdba4c5dccab95e8c8ebfdc75f438a0797dbfb2f8a1a5f4c423f9bfc1fea483342a11bd56a216f4d5158ccc4b224b52894fadfba3957dfe4b6b8f5f9f9fe422811a314768673e0c924340b8ccb84775ce9defaa3baa0910b676ad0036d13032b0dd94e3b13903cc738a7b6d00b0b3c210d1f972a6c7cae9bd3c959acf7565be528fc179118f28c679f6deeee1456f0781eb8154e18e49cb27b64bf74cd7112a0ebae2102ac
|
|
Kerberos 5, e23, AS-REQ Pre-Auth
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e23, AS-REQ Pre-Auth algorithm
|
Environment
|
Sample$krb5pa$23$user$realm$salt$4e751db65422b2117f7eac7b721932dc8aa0d9966785ecd958f971f622bf5c42dc0c70b532363138363631363132333238383835
|
|
WPA-PBKDF2-PMKID+EAPOL
Network Protocol |
Tier 1 |
Legacy Use |
Use for WPA-PBKDF2-PMKID+EAPOL algorithm
|
Environment
|
SampleWPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964***
|
|
WPA-PMKID-PBKDF2
Network Protocol |
Tier 1 |
Legacy Use |
Use for WPA-PMKID-PBKDF2 algorithm
|
Environment
|
Sample2582a8281bf9d4308d6f5731d0e61c61*4604ba734d4e*89acf0e761f4*ed487162465a774bfba60eb603a39f3a
|
|
Bitcoin/Litecoin wallet.dat
Cryptocurrency Wallet |
Tier 2 |
Legacy Use |
Use for Bitcoin/Litecoin wallet.dat algorithm
|
Environment
|
Sample$bitcoin$96$d011a1b6a8d675b7a36d0cd2efaca32a9f8dc1d57d6d01a58399ea04e703e8bbb44899039326f7a00f171a7bbc854a54$16$1563277210780230$158555$96$628835426818227243334570448571536352510740823233055715845322741625407685873076027233865346542174$66$625882875480513751851333441623702852811440775888122046360561760525
|
|
Apache $apr1$ MD5
FTP, HTTP |
Tier 2 |
Deprecated |
Use for Apache $apr1$ MD5 algorithm
|
Environment
|
Sample$apr1$71850310$gh9m4xcAn3MGxogwX/ztb.
|
|
Electrum Wallet (Salt-Type 4)
Cryptocurrency Wallet |
Tier 2 |
Deprecated |
Use for Electrum Wallet (Salt-Type 4) algorithm
|
Environment
|
Sample$electrum$4*03eae309d8bda5dcbddaae8145469193152763894b7260a6c4ba181b3ac2ed5653*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*1b0997cf64bb2c2ff88cb87bcacd9729d404bd46db18117c20d94e67c946fedc
|
|
7-zip $7z
Archive |
Tier 1 |
Legacy Use |
Use for 7-zip $7z algorithm
|
Environment
|
Sample$7z$0$19$0$salt$8$f6196259a7326e3f0000000000000000$185065650$112$98$f3bc2a88062c419a25acd40c0c2d75421cf23263f69c51b13f9b1aada41a8a09f9adeae45d67c60b56aad338f20c0dcc5eb811c7a61128ee0746f922cdb9c59096869f341c7a9cb1ac7bb7d771f546b82cf4e6f11a5ecd4b61751e4d8de66dd6e2dfb5b7d1022d2211e2d66ea1703f96
|
|
Whirlpool
Raw Hash |
Tier 2 |
Deprecated |
Use for Whirlpool algorithm
|
Environment
|
Sample7ca8eaaaa15eaa4c038b4c47b9313e92da827c06940e69947f85bc0fbef3eb8fd254da220ad9e208b6b28f6bb9be31dd760f1fdb26112d83f87d96b416a4d258
|
|
SHA256(utf16le)
Raw Hash |
Tier 2 |
Approved |
Use for SHA256(utf16le) algorithm
|
Environment
|
Sample9e9283e633f4a7a42d3abc93701155be8afe5660da24c8758e7d3533e2f2dc82
|
|
Bitwarden
Password Manager |
Tier 2 |
Legacy Use |
Use for Bitwarden algorithm
|
Environment
|
Sample$bitwarden$2*100000*2*bm9yZXBseUBoYXNoY2F0Lm5ldA==*+v5rHxYydSRUDlan+4pSoiYQwAgEhdmivlb+exQX+fg=
|
|
Argon2
Generic KDF |
Tier 2 |
Approved |
Use for Argon2 algorithm
|
Environment
|
Sample$argon2id$v=19$m=65536,t=3,p=1$FBMjI4RJBhIykCgol1KEJA$2ky5GAdhT1kH4kIgPN/oERE3Taiy43vNN70a3HpiKQU
|
|
scrypt
Generic KDF |
Tier 2 |
Approved |
Use for scrypt algorithm
|
Environment
|
SampleSCRYPT:1024:1:1:MDIwMzMwNTQwNDQyNQ==:5FW+zWivLxgCWj7qLiQbeC8zaNQ+qdO0NUinvqyFcfo=
|
|
MS-AzureSync PBKDF2-HMAC-SHA256
Cloud |
Tier 3 |
Approved |
Use for MS-AzureSync PBKDF2-HMAC-SHA256 algorithm
|
Environment
|
Samplev1;PPH1_MD4,84840328224366186645,100,005a491d8bf3715085d69f934eef7fb19a15ffc233b5382d9827910bc32f3506
|
|
Microsoft Online Account
Cloud |
Tier 3 |
Approved |
Use for Microsoft Online Account algorithm
|
Environment
|
Sample$MSONLINEACCOUNT$0$10000$91869d1d5d3a1df25dd3f0e57bbc226a43641bc03086dcb5b6672941fcabce01
|
|
Apple iWork
Document |
Tier 2 |
Legacy Use |
Use for Apple iWork algorithm
|
Environment
|
Sample$iwork$2$1$1$4000$b31b7320d1e7a5ee$01f54d6f9e5090eb16fef2b05f8242bc$69561c985268326b7353fb22c3685a378341127557bd2bbea1bd10afb31f2127344707b662a2c29480c32b8b93dea0538327f604e5aa8733be83af25f370f7ac
|
|
Windows Hello PIN/Password
Cloud |
Tier 3 |
Approved |
Use for Windows Hello PIN/Password algorithm
|
Environment
|
Sample$WINHELLO$*SHA512*10000*00761655*3b3d3197efb2839a6072e922cc03be910be55d1e60389689c05b520d2d57c06258dc5a48798ba65424004cbe2e003d0509036f3394bcae108eb6b77c7eb306d7*c0772a3aca949db60f274f315b3a5f63fea552fc0d1f2032db5293ca9690735217d918d4cf697aa45b2fe598168804040e18fe00758be94aac971985ea7a5521*bff47e398df761733b5aeda7035cdf289547db3afb94b70cbad2aaea21a5cd58*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*785435725a573571565662727670754100
|
|
Cisco-ASA MD5
Operating System |
Tier 3 |
Deprecated |
Use for Cisco-ASA MD5 algorithm
|
Environment
|
Sample02dMBMYkTdC5Ziyp:36
|
|
Cisco-PIX MD5
Operating System |
Tier 3 |
Deprecated |
Use for Cisco-PIX MD5 algorithm
|
Environment
|
SampledRRVnUmUHXOTt9nk
|
|
Cisco-IOS type 4
Operating System |
Tier 3 |
Unknown |
Use for Cisco-IOS type 4 algorithm
|
Environment
|
Sample2btjjy78REtmYkkW0csHUbJZOstRXoWdX1mGrmmfeHI
|
|
Cisco-ISE Hashed Password (SHA256)
Operating System |
Tier 3 |
Approved |
Use for Cisco-ISE Hashed Password (SHA256) algorithm
|
Environment
|
Sample465865d4226c4d9696e601f2c99b25ae2c194ec01806bafc93933331acfc1a60e8bdcca8be9fa245a5fa16029bb52480915746f47d1c539d01da7ec6f37468d1
|
|
BitLocker
Full-Disk Encryption |
Tier 3 |
Approved |
Use for BitLocker algorithm
|
Environment
|
Sample$bitlocker$1$16$6f972989ddc209f1eccf07313a7266a2$1048576$12$3a33a8eaff5e6f81d907b591$60$316b0f6d4cb445fb056f0e3e0633c413526ff4481bbf588917b70a4e8f8075f5ceb45958a800b42cb7ff9b7f5e17c6145bf8561ea86f52d3592059fb
|
|
KeePass
Password Manager |
Tier 2 |
Legacy Use |
Use for KeePass algorithm
|
Environment
|
Sample$keepass$*1*50000*0*375756b9e6c72891a8e5645a3338b8c8*82afc053e8e1a6cfa39adae4f5fe5e59f545a54d6956593d1709b39cacd7f796*c698fbfc7d1b71431d10611e2216ab21*24a63140f4eb3bfd7d59b7694eea38d1d93a43bc3af989755d2b326286c4d510*1*192*1a65072f436e9da0c9e832eca225a04ab78821b55d9f550860ade2ef8126a2c4050cf4d033374abd3dac6d0c5907c6cbb033643b203825c12e6c9853b5ac17a4809559fe723e01b4a2ab87cc83c8ba7ee4a757b8a0cf1674106f21f6675cba12064443d65436650df10ea0923c4cadfd4bfe341a6f4fa23a1a67f7d12a489fc5410ef6db9f6607905de491d3b3b915852a1b6c231c96366cbdee5ea9bd7f73ffd2f7a579215528ae1bf0ea540947ebfe39ca84bc6cbeded4f8e8fb6ed8f32dd5
|
|
Kerberos 5, e17, DB
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e17, DB algorithm
|
Environment
|
Sample$krb5db$17$test$TEST.LOCAL$1c41586d6c060071e08186ee214e725e
|
|
Kerberos 5, e17, Pre-Auth
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e17, Pre-Auth algorithm
|
Environment
|
Sample$krb5pa$17$hashcat$HASHCATDOMAIN.COM$a17776abe5383236c58582f515843e029ecbff43706d177651b7b6cdb2713b17597ddb35b1c9c470c281589fd1d51cca125414d19e40e333
|
|
Kerberos 5, e17, TGS-REP
Network Protocol |
Tier 3 |
Approved |
Use for Kerberos 5, e17, TGS-REP algorithm
|
Environment
|
Sample$krb5tgs$17$user$realm$ae8434177efd09be5bc2eff8$90b4ce5b266821adc26c64f71958a475cf9348fce65096190be04f8430c4e0d554c86dd7ad29c275f9e8f15d2dab4565a3d6e21e449dc2f88e52ea0402c7170ba74f4af037c5d7f8db6d53018a564ab590fc23aa1134788bcc4a55f69ec13c0a083291a96b41bffb978f5a160b7edc828382d11aacd89b5a1bfa710b0e591b190bff9062eace4d26187777db358e70efd26df9c9312dbeef20b1ee0d823d4e71b8f1d00d91ea017459c27c32dc20e451ea6278be63cdd512ce656357c942b95438228e
|
|
RAR 5
Archive |
Tier 1 |
Legacy Use |
Use for RAR 5 algorithm
|
Environment
|
Sample$rar5$16$74575567518807622265582327032280$15$f8b4064de34ac02ecabfe9abdf93ed6a$8$9843834ed0f7c754
|
|
RAR 3
Archive |
Tier 1 |
Legacy Use |
Use for RAR 3 algorithm
|
Environment
|
Sample$RAR3$*0*45109af8ab5f297a*adbf6c5385d7a40373e8f77d7b89d317
|
|
WinZip
Archive |
Tier 1 |
Legacy Use |
Use for WinZip algorithm
|
Environment
|
Sample$zip2$*0*3*0*e3222d3b65b5a2785b192d31e39ff9de*1320*e*19648c3e063c82a9ad3ef08ed833*3135c79ecb86cd6f48fc*$/zip2$
|
FAQ
- Why are some “insecure” algorithms supported?
Because they are still present in legacy systems. Supporting them helps organizations identify risk and plan migrations. - Why is verification required for some algorithms?
Because certain formats protect modern systems or identities and require professional context to be handled responsibly. - Does OnlineHashCrack support offensive hacking?
No. The platform is designed for audits, recovery, compliance checks, and incident response, in accordance with applicable laws.