MD5 reverse for 6dc920c0398413bdbdc3d4ba2dfaa932

The MD5 hash 6dc920c0398413bdbdc3d4ba2dfaa932 was successfully reversed into the string 02 c2 b7 c2 af c2 a2 5b c2 ad c2 8a c2 89 c3 a2 c2 b1 c3 8a 26 c2 8a 78 26 c3 89 c3 ba c3 a2 7a 77 6c 59 c3 a9 65 c2 8a c3 99 c2 9a c3 89 c2 b7 c2 88 76 c2 89 c3 ad c2 92 7a 30 6e c3 ab 48 c2 85 c2 ab c3 9e 7a 7a 2e c2 82 18 c2 a7 7e c2 8a c3 a6 6a c3 98

Feel free to provide some other MD5 hashes you would like to try to reverse.

Reverse a MD5 hash

You can generate the MD5 hash of the string which was just reversed to have the proof that it is the same as the MD5 hash you provided:

Convert a string to a MD5 hash

What is a MD5 hash?

MD5 (Message Digest algorithm, 5th version) is an algorithm which converts a given sequence of characters into another unique sequence of characters, with a fixed length, called "hash". For instance, the MD5 hash of the word password is 5f4dcc3b5aa765d61d8327deb882cf99.

These hashes are mostly used to validate file integrity, to encrypt sensitive data (like passwords), and to generate unique identifiers.

Is it secure?

MD5 hashes are theoretically impossible to reverse directly, ie, it is not possible to retrieve the original string from a given hash using only mathematical operations.

Most web sites and applications store their user passwords into databases with MD5 encryption. This method appears to be safe as it seems impossible to retrieve original user passwords if, say, a hacker manages to have a look at the database content.

Unfortunately, there is a way to decrypt a MD5 hash, using a dictionary populated with strings and their MD5 counterpart. As most users use very simple passwords (like "123456", "password", "abc123", etc), MD5 dictionaries make them very easy to retrieve.

This website uses a MD5 reverse dictionary containing several millions of entries, which you can use with MD5 hashes from your application.

If some of the hashes you enter can be reversed, consider using another way of generating hashes, like using stronger algorithms (SHA-2, Whirlpool, etc), combining algorithms, and using a "salt".