MD5解密之最快方法

一般来说,形如1e4dc79d489e86b2的16位或者32位密码就是经过MD5加密的,(当然也有特殊,比如DVBBS在登陆时候会先产生一个16位的随机密码,当然,这个密码还是和MD5密码的形式有点区别,相同的是都是16位的数字+字母组合 。);

这个一般来说可以用一个叫dv.exe的工具来破解。他可以破解加密前是10位以下的纯数字或者纯字母,破解纯数字的,速度超快,但是纯字母的,就慢了,当然他还有其他功能,但是其他功能没什么特别之处,所以不说。
破解纯数字时候:dv -p a.txt -b num
纯字母: dv -p a.txt -b char
[以上的两a.txt是保存要破解的密码存放的文件,存放格式是每行一组,例如:
1e4dc79d489e86b2 admin
1e4dc79d489e86b3 admin2
......
注意:在要破解的密码和后面的admin 用户名之间有一个空格。
  当然还有很多字典破解 的工具,不建议使用。
还有就是有很多网站提供MD5密码查询,比如:
http://www.md5lookup.com/?category=01-3&searck=on
http://www.md5.org.cn
http://www.xmd5.org/
http://www.milw0rm.com/md5/info.php
http://www.neeao.com/md5/
http://md5.mmkey.com/
http://gdataonline.com/seekhash.php
http://www.plain-text.info/search.php
http://passcracking.com/Good_values_list.asp
http://www.hashchecker.com/index.php?_sls=search_hash
http://md5.rednoize.com/
http://us.md5.crysm.net/

 

md5解密工具; 基础方法: 打开MD5_SSE2.exe,输入MD5值,按回车即可 高级方法: 用命令行进入MD5_SSE2所在目录 执行MD5_SSE2 注意事项:请将本程序放在英文路径下,放在中文路径下可能会出现问题 关于配置文件: 配置文件决定着密码生成引擎的行为 1.maskcharset.txt是掩码的配置文件 规则:第一个字符是掩码符号,接下来是该符号所对应的字符集 默认的掩码文件内的定义如下: (1)*:全部可输入字符(大小写字母+数字+特殊符号) (2)l:小写字母 (3)u:大写字母 (4)a:大小写字母 (5)p:小写字母+数字 (6)d:数字 (7)s:符号 (8)x:大小写字母+数字+符号 上面的定义只是默认的,你也可以根据需要进行修改 2.*.ini是决定密码生成引擎生成密码规则的文件(默认MD5Crk.ini) 规则:每行表示一种组合方式 该行首字母表示使用何种子生成引擎 (1)掩码生成引擎 首字母:m(mask) 每个掩码开头用“,”(半角逗号),逗号后面表示使用何种掩码,若字符前无逗号,则在生成的密码中直接使用此字符,若是两个逗号,则表示一个逗号(转义) 例子: m,l,l,l,l,l(五位小写字母) m,d,d,d,d,d,d(六位数字) m,l,l,l,d,d,d(前三位小写字母,后三位数字) (2)混合生成引擎(基于字典和掩码的混合) 首字母:h(hybrid) 使用掩码的方法和上面的一样,另外可以使用字典,用";"(半角分号)表示字典文件名的开头,随后是字典文件名,用","或";"来表示下一个配置方式 例子: h;pass.txt,d,d,d(取pass.txt字典文件的内容为开头,三位数字为结尾) h,d;pass.txt,d,d(以一位数字为开头,接着是pass.txt字典中的单词,结尾是两位数字)
'部分代码如下 Public Function MD5(sMessage) m_lOnBits(0) = CLng(1) m_lOnBits(1) = CLng(3) m_lOnBits(2) = CLng(7) m_lOnBits(3) = CLng(15) m_lOnBits(4) = CLng(31) m_lOnBits(5) = CLng(63) m_lOnBits(6) = CLng(127) m_lOnBits(7) = CLng(255) m_lOnBits(8) = CLng(511) m_lOnBits(9) = CLng(1023) m_lOnBits(10) = CLng(2047) m_lOnBits(11) = CLng(4095) m_lOnBits(12) = CLng(8191) m_lOnBits(13) = CLng(16383) m_lOnBits(14) = CLng(32767) m_lOnBits(15) = CLng(65535) m_lOnBits(16) = CLng(131071) m_lOnBits(17) = CLng(262143) m_lOnBits(18) = CLng(524287) m_lOnBits(19) = CLng(1048575) m_lOnBits(20) = CLng(2097151) m_lOnBits(21) = CLng(4194303) m_lOnBits(22) = CLng(8388607) m_lOnBits(23) = CLng(16777215) m_lOnBits(24) = CLng(33554431) m_lOnBits(25) = CLng(67108863) m_lOnBits(26) = CLng(134217727) m_lOnBits(27) = CLng(268435455) m_lOnBits(28) = CLng(536870911) m_lOnBits(29) = CLng(1073741823) m_lOnBits(30) = CLng(2147483647) m_l2Power(0) = CLng(1) m_l2Power(1) = CLng(2) m_l2Power(2) = CLng(4) m_l2Power(3) = CLng(8) m_l2Power(4) = CLng(16) m_l2Power(5) = CLng(32) m_l2Power(6) = CLng(64) m_l2Power(7) = CLng(128) m_l2Power(8) = CLng(256) m_l2Power(9) = CLng(512) m_l2Power(10) = CLng(1024) m_l2Power(11) = CLng(2048) m_l2Power(12) = CLng(4096) m_l2Power(13) = CLng(8192) m_l2Power(14) = CLng(16384) m_l2Power(15) = CLng(32768) m_l2Power(16) = CLng(65536) m_l2Power(17) = CLng(131072) m_l2Power(18) = CLng(262144) m_l2Power(19) = CLng(524288) m_l2Power(20) = CLng(1048576) m_l2Power(21) = CLng(2097152) m_l2Power(22) = CLng(4194304) m_l2Power(23) = CLng(8388608) m_l2Power(24) = CLng(16777216) m_l2Power(25) = CLng(33554432) m_l2Power(26) = CLng(67108864) m_l2Power(27) = CLng(134217728) m_l2Power(28) = CLng(268435456) m_l2Power(29) = CLng(536870912) m_l2Power(30) = CLng(1073741824) Dim x Dim k Dim AA Dim BB Dim CC Dim DD Dim a Dim b Dim c Dim d Const S11 = 7 Const S12 = 12 Const S13 = 17 Const S14 = 22 Const S21 = 5 Const S22 = 9 Const S23 = 14 Const S24 = 20 Const S31 = 4 Const S32 = 11 Const S33 = 16 Const S34 = 23 Const S41 = 6 Const S42 = 10 Const S43 = 15 Const S44 = 21 x = ConvertToWordArray(sMessage) a = &H67452301; b = &HEFCDAB89; c = &H98BADCFE; d = &H10325476; For k = 0 To UBound(x) Step 16 AA = a BB = b CC = c DD = d md5_FF a, b, c, d, x(k + 0), S11, &HD76AA478; md5_FF d, a, b, c, x(k + 1), S12, &HE8C7B756; md5_FF c, d, a, b, x(k + 2), S13, &H242070DB; md5_FF b, c, d, a, x(k + 3), S14, &HC1BDCEEE; md5_FF a, b, c, d, x(k + 4), S11, &HF57C0FAF; md5_FF d, a, b, c, x(k + 5), S12, &H4787C62A; md5_FF c, d, a, b, x(k + 6), S13, &HA8304613; md5_FF b, c, d, a, x(k + 7), S14, &HFD469501; md5_FF a, b, c, d, x(k + 8), S11, &H698098D8; md5_FF d, a, b, c, x(k + 9), S12, &H8B44F7AF; md5_FF c, d, a, b, x(k + 10), S13, &HFFFF5BB1; md5_FF b, c, d, a, x(k + 11), S14, &H895CD7BE; md5_FF a, b, c, d, x(k + 12), S11, &H6B901122; md5_FF d, a, b, c, x(k + 13), S12, &HFD987193; md5_FF c, d, a, b, x(k + 14), S13, &HA679438E; md5_FF b, c, d, a, x(k + 15), S14, &H49B40821; md5_GG a, b, c, d, x(k + 1), S21, &HF61E2562; md5_GG d, a, b, c, x(k + 6), S22, &HC040B340; md5_GG c, d, a, b, x(k + 11), S23, &H265E5A51; md5_GG b, c, d, a, x(k + 0), S24, &HE9B6C7AA; md5_GG a, b, c, d, x(k + 5), S21, &HD62F105D; md5_GG d, a, b, c, x(k + 10), S22, &H2441453; md5_GG c, d, a, b, x(k + 15), S23, &HD8A1E681; md5_GG b, c, d, a, x(k + 4), S24, &HE7D3FBC8; md5_GG a, b, c, d, x(k + 9), S21, &H21E1CDE6; md5_GG d, a, b, c, x(k + 14), S22, &HC33707D6; md5_GG c, d, a, b, x(k + 3), S23, &HF4D50D87; md5_GG b, c, d, a, x(k + 8), S24, &H455A14ED; md5_GG a, b, c, d, x(k + 13), S21, &HA9E3E905; md5_GG d, a, b, c, x(k + 2), S22, &HFCEFA3F8; md5_GG c, d, a, b, x(k + 7), S23, &H676F02D9; md5_GG b, c, d, a, x(k + 12), S24, &H8D2A4C8A; md5_HH a, b, c, d, x(k + 5), S31, &HFFFA3942; md5_HH d, a, b, c, x(k + 8), S32, &H8771F681; md5_HH c, d, a, b, x(k + 11), S33, &H6D9D6122; md5_HH b, c, d, a, x(k + 14), S34, &HFDE5380C; md5_HH a, b, c, d, x(k + 1), S31, &HA4BEEA44; md5_HH d, a, b, c, x(k + 4), S32, &H4BDECFA9; md5_HH c, d, a, b, x(k + 7), S33, &HF6BB4B60; md5_HH b, c, d, a, x(k + 10), S34, &HBEBFBC70; md5_HH a, b, c, d, x(k + 13), S31, &H289B7EC6; md5_HH d, a, b, c, x(k + 0), S32, &HEAA127FA; md5_HH c, d, a, b, x(k + 3), S33, &HD4EF3085; md5_HH b, c, d, a, x(k + 6), S34, &H4881D05; md5_HH a, b, c, d, x(k + 9), S31, &HD9D4D039; md5_HH d, a, b, c, x(k + 12), S32, &HE6DB99E5; md5_HH c, d, a, b, x(k + 15), S33, &H1FA27CF8; md5_HH b, c, d, a, x(k + 2), S34, &HC4AC5665; md5_II a, b, c, d, x(k + 0), S41, &HF4292244; md5_II d, a, b, c, x(k + 7), S42, &H432AFF97; md5_II c, d, a, b, x(k + 14), S43, &HAB9423A7; md5_II b, c, d, a, x(k + 5), S44, &HFC93A039; md5_II a, b, c, d, x(k + 12), S41, &H655B59C3; md5_II d, a, b, c, x(k + 3), S42, &H8F0CCC92; md5_II c, d, a, b, x(k + 10), S43, &HFFEFF47D; md5_II b, c, d, a, x(k + 1), S44, &H85845DD1; md5_II a, b, c, d, x(k + 8), S41, &H6FA87E4F; md5_II d, a, b, c, x(k + 15), S42, &HFE2CE6E0; md5_II c, d, a, b, x(k + 6), S43, &HA3014314; md5_II b, c, d, a, x(k + 13), S44, &H4E0811A1; md5_II a, b, c, d, x(k + 4), S41, &HF7537E82; md5_II d, a, b, c, x(k + 11), S42, &HBD3AF235; md5_II c, d, a, b, x(k + 2), S43, &H2AD7D2BB; md5_II b, c, d, a, x(k + 9), S44, &HEB86D391; a = AddUnsigned(a, AA) b = AddUnsigned(b, BB) c = AddUnsigned(c, CC) d = AddUnsigned(d, DD) Next MD5_32 = LCase(WordToHex(a) & WordToHex(b) & WordToHex(c) & WordToHex(d)) '32位MD5 MD5_16 = LCase(WordToHex(b) & WordToHex(c)) '16位MD5 End Function
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值