CH25 Hashing Flashcards
What is Hashing ?
a one-way cryptographic function which takes an input and produces a unique message digest
For the exam :
1. Hashing is used to ensure integrity. Any time you see a question that mentions integrity on the exam, you should instantly be thinking that the answer has something to do with hashing.
2. Two most common hashes in the world are MD5 and the SHA families of hashes, but MD5 is less secure than SHA
What is MD5 ?
MD5 = Message Digest 5
algorithm that creates a fixed-length 128-bit hash value unique to the input file.
What is Collision?
condition that occurs when two different files create the same hash digest
What is Secure hash Algorithm (SHA-1) ?
algorithm that creates a fixed-length 160-bit hash value unique to the input file.
What is Secure Hash Algorithm (SHA-2)?
Family of algorithms that includes SHA-224, SHA-256, SHA-348, and SHA-512
What is Secure Hash Algorithm (SHA-3)?
Family of algorithms that creates hash digests between 224-bits and 512-bits
What is RIPEMD ?
RACE integrity Primitive Evaluation Message Digest – an open-source hash algorithm that creates a unique 160-bit, 256-bit, or 320-bit message digest for each input file.
What is Digital signatures?
prevent collisions from being used to spoof the integrity of a message.
Digital signatures use either DSA, RSA, ECDSA, or SHA
What is Code Signing ?
uses digital signatures to provide an assurance that the software code has not been modified after it was submitted by the developer
What is LANMAN (LM Hash) ?
Original version of password hashing used by Windows that uses DES and is limited to 14 characters.
You should disable LM Hash on your modern Windows OS. (It is disabled by default)
What is NT LAN Manager Has (NTLM Hash) ?
Replacement for LM Hash that sues RC4 and was released with Windows NT 3.1 in 1993. It is disabled by default
What is NTLMv2 Hash?
Replacement to NTLM Hash that uses HMAC-MD5 and is considered difficult to crack. It is used when you do not have a domain with Kerberos for authentication?
What is Pass the Hash Attack ?
A technique that allows an attacker to authenticate to a remote server by using underlying NTLM or LM hash instead of requiring the associated plaintext password.
Pass the Hash is difficult to defend against.
What is Mimikatz ?
a penetration testing tool used to automate the harvesting of hashes and conducting the Pass the Hash attack.
What things can you do to prevent Pass the Hash attack?
a. ensure that only trusted operating systems are allowed to connect to your servers
b. Window’s domains have their trusts set up properly
c. workstations are all patched and updated
d. multifactor authentication is being used properly
e. accounts have been set up to use the concept of least privilege.