answersLogoWhite

0

What is the most commonly used password hash under Linux?

Updated: 8/16/2019
User Avatar

Wiki User

12y ago

Best Answer

This is impossible to fully answer. Password hashes are "salted" in Linux. This means, among other things, that the stored value for the same password can vary significantly.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the most commonly used password hash under Linux?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is algprithm that Linux is used to decode the password?

This really depends on which password you mean. Most user passwords aren't so much decoded as they are hashed through alorithms such as MD5 and the result compared to a stored hash for the password. If the hashes match, Linux concludes the password is correct. Passwords are done this way as checksum hashes can't be reversed. They are assymetrical, meaning running a hash through the same algorithm merely results in another hash, not the password. This is a very secure way to store passwords.


How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.


What is lamport hash?

Lamport's hash implements a one-time password protecting against eavesdropping and password file theft.


How do you express comments in Linux?

# This comment is ignored as it is preceded with a hash sign (#).


What data type is suitable for password field?

We never store passwords in a password field. If we did that, anyone with access to the database would have access to all the passwords. Instead, we store the output from a one-way cryptographic hashing function. That is, when a user creates a password, we store the hash value generated from that password via the hashing function. When the user subsequently enters their password in order to log on, the hash value generated by the entered password is compared with the stored hash value. If the two hash values match exactly then the correct password was entered. Being one-way, it is not possible to determine the password from the hash value, even if we know the precise implementation details of the hash function employed to create the hash value. This is the safest way to store passwords; we simply need to ensure that the same hash function that was used to generate the hash is also used to validate the user's password at logon. Cryptographic hashes can vary in length depending on which function was used to generate the hash value. Typical values are 128-bit, 160-bit, 256-bit and 512-bit, thus a fixed-length binary field of the required length would be suitable for storing the hash values.


If you forget your password can you get it back?

Generally speaking, no. The way secure websites and programs store passwords is in a hash, not plaintext. When you submit your password, the password you give is encrypted and compared to the stored password hash you originally gave. Since the encryption cannot be undone, your original password cannot be provided to you.


What is an example sentence for the word hash?

An example sentence for hash is: One definition of hash is dish of cooked meat cut into small pieces and cooked again, usually with potatoes.


Hash function for storing password in c program?

MD5 and SHA1 are quite common.


How do you create hash of password?

I'm not sure i got your question right or not, but if you mean how to encrypt password for saving or ect, use md5 function


How can you reset the BIOS password on a HP nx9010 laptop. i have tried the remove the battery system that doesn't work for me. can anyone help?

"Yes. Call 784-2751, And You'll get help." you can also get the hash key, by entering the password 3 times incorrectly then pressing F12 on the 3rd password attempt, you will get the 5 digit hash. you can then go to this site http://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html and download the software for your machine (hewlett packard) and run the program pwgen-5dec.exe this will open in a DOS window if you are running windows. the program will ask you to enter your 5 digit hash it will then generate the master password for your machine. the password you will need is listed under the Hp/Phoenix password. good luck!


Which hash algorithm is commonly used in networking protocols and systems?

SHA-1


How do you access the superuser password on ubuntu without access privileges like a command prompt or something?

You can't "access" the superuser password. In addition to being stored in a file only readable by the superuser, its also encrypted in a one-way hash. This means that it is not stored in plaintext, and the computer checks to see if the password is correct by encrypting the supplied password and seeing if the hash matches, not just comparing the passwords sirectly.