Added link to page that reverse-engineers a hash to a text string that produces that MD5 hash

DarrDarr 2017-06-11 19:55:56 -04:00
parent 4527b509c9
commit 67da1fb0a1

@ -9,3 +9,6 @@ WebUI\Password_ha1=@ByteArray(5ebe2294ecd0e0f08eab7690d2a6ee69)
``` ```
the password will be set to `secret`. the password will be set to `secret`.
4. You should then be able to login the WebUI using your usual username and the password `secret`. Remember to change it back to your preferred password. 4. You should then be able to login the WebUI using your usual username and the password `secret`. Remember to change it back to your preferred password.
You could also try copy/pasting the existing value in WebUI\Password_ha1=@ByteArray(value) into https://isc.sans.edu/tools/reversehash.html and that could possibly reveal what the original password was.