From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Employing rainbow tables
From the course: Ethical Hacking: System Hacking
Employing rainbow tables
- [Instructor] In most cases, a hash value is used to obscure a plain text password. In this segment, we'll explore how malicious actors use rainbow tables to discover a password. First, let's talk about how most systems manage passwords. Password management is used to protect the integrity and confidentiality of the passwords in the system. In most cases, the system generates a hash value of the password, stores the value in a file, and the password is discarded. So why do we use a password hash? Well, let's talk about encryption versus hashing. Encryption uses a key to protect data. When we encrypt a message with a key, we can decrypt the message as long as we have the key. However, hashing is a one-way cryptographic function. You cannot generate the original message from the hash. Now, there are several hash algorithms, but two popular algorithms are SHA-256 and SHA-3. These hash functions are used in different applications, including authenticating a message, monitoring data…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.