Problem Statement
Users' passwords are typically stored not in their plaintext form, but in their digest (or hashed) form. For example, in Linux and Windows systems, users' passwords are stored in hashes.
You are given 5 different hash values. Crack those hash values in order to recover the original word that was used to produce those hashes in the first place.
Use any freely-available tools. A good place for you to start is by reading this article: https://fossbytes.com/best-password-cracking-tools-2016-windows-linux-download/
The hash values that you need to crack are:
1. b9b985cdc61c8db72289ce54f0937eb2
2. bdc87b9c894da5168059e00ebffb9077
3. f68dcb11db7389c970cd2c3d51ec456de8b43c77
4. 8c599c4256f1dcf620614c8fc87ff4ab91c348e1
5. 14751031b69d5480dfb30023f72640dd45a3c5de
Hint: First determine the type of hash functions that were used to produce those hash values (they are either MD5 or SHA-1).
Hand-in a short report detailing:
• Step-by-step approach you have taken in order to crack the hash values given above, including the tools that you have used
• The original word(s) used to produce each of those five hash values. If one or more of those hashes cannot be cracked, state that you did not manage to do so in the report.