{"id":4472,"date":"2017-03-27T23:46:06","date_gmt":"2017-03-27T15:46:06","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4472"},"modified":"2017-03-27T23:46:23","modified_gmt":"2017-03-27T15:46:23","slug":"hashpump-exploit-hash-length-extension-attack","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/03\/hashpump-exploit-hash-length-extension-attack\/","title":{"rendered":"HashPump – Exploit Hash Length Extension Attack"},"content":{"rendered":"

HashPump is a C++ based command line tool to exploit the Hash Length Extension Attack with various hash types supported, including MD4, MD5, SHA1, SHA256, and SHA512.<\/p>\n

\"HashPump<\/p>\n

There’s a good write-up of how to use this in practical terms here: Plaid CTF 2014: mtpox<\/a><\/p>\n

Usage<\/h3>\n