Hash Identifier & Analyzer

Identify and analyze hash types from hash strings. Supports MD5, SHA-1, SHA-2, SHA-3, bcrypt, Argon2, scrypt, PBKDF2, and more. Analyzes hash format, length, and characteristics to determine the most likely hashing algorithm used.

Input

Supports 100+ hash types: MD5, SHA-1/2/3, BLAKE2/3, bcrypt, Argon2, scrypt, PBKDF2, MySQL, PostgreSQL, Oracle, MSSQL, Unix Crypt, WordPress, Drupal, Joomla, NTLM, Cisco, LDAP, and more

Analysis Results

Analysis results will appear here

Enter hash and click "Identify Hash Type" to start

How Hash Identification Works

  • Length Analysis: Different algorithms produce different output lengths
  • Format Recognition: Structured hashes (bcrypt, Argon2, PBKDF2) have distinctive formats
  • Pattern Matching: Character patterns help distinguish between algorithms
  • Confidence Levels: Higher confidence when format is unique to one algorithm
  • Multiple Matches: Some lengths match multiple algorithms (disambiguation needed)
  • PBKDF2 Detection: Identifies both raw output and structured formats

Supported Hash Types (100+)

Cryptographic Hashes:

  • • MD2, MD4, MD5 (deprecated)
  • • SHA-1 (deprecated)
  • • SHA-224, SHA-256, SHA-384, SHA-512
  • • SHA-3 / Keccak variants
  • • BLAKE2b, BLAKE2s, BLAKE3
  • • RIPEMD-160
  • • Whirlpool, Tiger-192
  • • GOST R 34.11-94, HAVAL, Snefru

Password Hashes:

  • • bcrypt ($2a$, $2b$, $2y$)
  • • Argon2 (id, d, i variants)
  • • scrypt, yescrypt
  • • PBKDF2 (structured & raw)
  • • HMAC-SHA1/256/512
  • • Unix Crypt (DES, MD5, SHA-256/512)
  • • Apache MD5 (APR1)

Database Hashes:

  • • MySQL 3.x, 4.1/5.x
  • • PostgreSQL MD5
  • • Oracle 10g, 11g, 12c
  • • MSSQL 2000, 2005, 2012+
  • • MongoDB ScramSHA1/256

CMS/Frameworks:

  • • WordPress ($P$, $H$)
  • • Drupal 7+ ($S$)
  • • Joomla (bcrypt, MD5+salt)
  • • phpBB3 ($H$)
  • • vBulletin (3.8.5+, older)
  • • Django (PBKDF2, bcrypt)

Windows/Network:

  • • LM Hash (deprecated)
  • • NTLM, NTLMv2
  • • Domain Cached Credentials (DCC/DCC2)
  • • Cisco Type 5, 7, 9
  • • Cisco IOS SHA256
  • • Juniper NetScreen

LDAP/Other:

  • • LDAP SSHA, SSHA256, SSHA512
  • • LDAP MD5, SHA, Crypt
  • • Base64-encoded hashes
  • • CRC32, Adler-32 (checksums)

Important Notes

  • Raw Hash Limitation: Cannot distinguish between algorithms with same output length
  • Deprecated Algorithms: MD5 and SHA-1 are cryptographically broken - avoid for new systems
  • PBKDF2 Raw Output: Looks identical to SHA-256, SHA-512, BLAKE variants, etc.
  • Context Matters: Use application context, file extensions, or documentation to confirm identification
  • Verification Method: Try PBKDF2 verification with known parameters to confirm
  • Modern Systems: If hash is from recent application, prefer modern algorithms over legacy ones
  • Security: Never attempt to reverse or crack hashes without proper authorization

Algorithm Categories & Use Cases

🔐 Password Hashing: Argon2, bcrypt, scrypt, yescrypt, PBKDF2 - designed to be slow and secure against brute force
🏃‍♂️ Fast Hashing: BLAKE2, BLAKE3 - modern, fast, secure alternatives to SHA-2
📊 Data Integrity: CRC32, Adler-32 - non-cryptographic checksums for error detection
🏛️ Legacy Systems: MD2, MD4, MD5, SHA-1, LM Hash - older algorithms, deprecated and insecure
🔒 Cryptographic: SHA-2, SHA-3 - secure general-purpose cryptographic hashing
🔑 Key Derivation: HMAC variants, PBKDF2 - for generating keys from passwords/secrets
🗄️ Database-Specific: MySQL, PostgreSQL, Oracle, MSSQL formats - database password storage formats
🌐 Web Applications: WordPress, Drupal, Joomla, Django - CMS and framework password hashes
🖥️ Windows/Network: NTLM, DCC, Cisco Types - system and network device authentication hashes
📁 Directory Services: LDAP SSHA variants - directory server password hashes

💡 Identification Tips

File Extensions: .md5, .sha1, .sha256 files often indicate the hash type
Application Context: Django uses PBKDF2, WordPress uses $P$, Drupal uses $S$, bcrypt common in Ruby, Argon2 in modern apps
Database Context: MySQL hashes start with *, PostgreSQL with md5, Oracle 11g with S:, MSSQL with 0x0100/0x0200/0x0300
Length Patterns: 8 = checksums, 13 = DES crypt, 16 = MySQL 3.x/Oracle 10g, 32 = MD5/NTLM/LM, 40 = SHA-1, 41 = MySQL 4.1/5.x, 64 = SHA-256
Structured Formats: $ delimiters indicate Unix crypt, bcrypt, Argon2, scrypt, yescrypt, PBKDF2. Curly braces indicate LDAP hashes
Prefix Detection: $1$ = MD5 crypt, $2 = bcrypt, $5$ = SHA-256 crypt, $6$ = SHA-512 crypt, $argon2 = Argon2, $P$ = WordPress, $S$ = Drupal
Performance Clues: Very fast generation suggests simple hash, slow suggests password hash (bcrypt, Argon2, scrypt)
Modern Systems: Recent applications likely use SHA-2+, BLAKE variants, Argon2, or yescrypt for passwords

About Hash Identifier & Analyzer

The Hash Identifier & Analyzer is a comprehensive forensic tool that automatically identifies and analyzes hash types from hash strings. It supports detection of all major hashing algorithms including MD5, SHA-1, SHA-2 family, SHA-3, bcrypt, Argon2, scrypt, PBKDF2, and many others by analyzing hash format, length, character patterns, and structural characteristics to determine the most likely algorithm used.

Why use a Hash Identifier & Analyzer?

Hash identification is crucial for security analysis, forensic investigations, and system migrations where you need to understand what hashing algorithms are being used without access to source code or documentation. This tool eliminates guesswork by providing automated analysis and saves valuable time in security assessments, penetration testing, and reverse engineering tasks where hash type identification is essential.

Who is it for?

Essential for cybersecurity professionals conducting security audits, digital forensics investigators analyzing hash evidence, and penetration testers identifying authentication mechanisms. Perfect for security researchers studying hash implementations, system administrators migrating legacy systems, and developers working with inherited codebases where hash algorithms need to be identified.

How to use the tool

1

Paste the unknown hash string into the input field for analysis

2

Click analyze to run automatic hash type identification algorithms

3

Review the analysis results showing possible hash types ranked by probability

4

Examine detailed information about hash characteristics, format, and algorithm properties

5

Use the identification results to select appropriate tools for hash generation or verification

Share This Tool

Found this tool helpful? Share it with others who might benefit from it!

💡 Help others discover useful tools! Sharing helps us keep these tools free and accessible to everyone.

Support This Project

Buy Me a Coffee