![]() ![]() ![]() I'm surprised that I can't find a reliable source describing the UFD2 scheme (which seems not to be SHA1 or MD5), only very dodgy sites selling software to brute-force them. So people asking for a "decrypt" have obtained one of the large dumps of (username,hashedpw) data that have been released, and are looking for help brute-forcing a password that will hash to hashedpw, allowing them to log in to those accounts. Noiratsi ( talk) 13:29, 2 March 2013 (UTC) Reply It seems that Unique-F-Digest algorithm 2 (UFD2, not udf2) is a password hashing scheme (reminiscent of, but not built from, md5) used by some large websites. ![]() Can anyone shed any light? I do know what a hash is. I'm starting to suspect they don't even exist. The thing is, I can't find a single website that actually says anything about what a udf2 hash might be when it's at home. What's more forums seem to be full of people asking if anyone can "decrypt this udf2 hash for me please?". Lots of websites claim to offer to decrypt "UFD2" hashes, if you sign up for an account with them.
0 Comments
Leave a Reply. |