Weak Hashing Algorithm MD5 APP
Like most hash functions, MD5 is neither encryption nor encoding. It can be cracked by brute-force attack and suffers from extensive vulnerabilities.
The security of the MD5 has been severely compromised, with its weaknesses having been exploited in the field, most infamously by the Flame malware in 2012.
Your task is to find 's MD5 hash from the application and try to crack the hash and into the application.