From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Hashing, continued

Hashing, continued

- [Presenter] Hashing is very useful in protecting passwords. If you think about it, it wouldn't be safe to store passwords in plain text in a systems database. A hacker could gain even read-only access to the database and you can see how this can quickly become dangerous. Just as a personal warning, stay away from websites where if you select the forgot password option, it triggers their system to send your password in plain text via email. In addition, weak, common and repeated passwords can be vulnerable to attacks, especially if a hacker uses a long list of possible password values known as a rainbow table, to compare against a compromised username and password list. The easiest solution is to hash the passwords first. However, in doing so, the hash value for the same password as you can see in the first two rows will have the same output. A hacker can take that same concept to compare rainbow tables of hash passwords, so we need to look for greater ways to add more layers of…

Contents