CH25 Hashing Flashcards

1
Q

What is Hashing ?

A

a one-way cryptographic function which takes an input and produces a unique message digest

For the exam :
1. Hashing is used to ensure integrity. Any time you see a question that mentions integrity on the exam, you should instantly be thinking that the answer has something to do with hashing.
2. Two most common hashes in the world are MD5 and the SHA families of hashes, but MD5 is less secure than SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MD5 ?

A

MD5 = Message Digest 5

algorithm that creates a fixed-length 128-bit hash value unique to the input file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Collision?

A

condition that occurs when two different files create the same hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Secure hash Algorithm (SHA-1) ?

A

algorithm that creates a fixed-length 160-bit hash value unique to the input file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Secure Hash Algorithm (SHA-2)?

A

Family of algorithms that includes SHA-224, SHA-256, SHA-348, and SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Secure Hash Algorithm (SHA-3)?

A

Family of algorithms that creates hash digests between 224-bits and 512-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RIPEMD ?

A

RACE integrity Primitive Evaluation Message Digest – an open-source hash algorithm that creates a unique 160-bit, 256-bit, or 320-bit message digest for each input file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Digital signatures?

A

prevent collisions from being used to spoof the integrity of a message.

Digital signatures use either DSA, RSA, ECDSA, or SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Code Signing ?

A

uses digital signatures to provide an assurance that the software code has not been modified after it was submitted by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is LANMAN (LM Hash) ?

A

Original version of password hashing used by Windows that uses DES and is limited to 14 characters.

You should disable LM Hash on your modern Windows OS. (It is disabled by default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is NT LAN Manager Has (NTLM Hash) ?

A

Replacement for LM Hash that sues RC4 and was released with Windows NT 3.1 in 1993. It is disabled by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is NTLMv2 Hash?

A

Replacement to NTLM Hash that uses HMAC-MD5 and is considered difficult to crack. It is used when you do not have a domain with Kerberos for authentication?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Pass the Hash Attack ?

A

A technique that allows an attacker to authenticate to a remote server by using underlying NTLM or LM hash instead of requiring the associated plaintext password.

Pass the Hash is difficult to defend against.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Mimikatz ?

A

a penetration testing tool used to automate the harvesting of hashes and conducting the Pass the Hash attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What things can you do to prevent Pass the Hash attack?

A

a. ensure that only trusted operating systems are allowed to connect to your servers
b. Window’s domains have their trusts set up properly
c. workstations are all patched and updated
d. multifactor authentication is being used properly
e. accounts have been set up to use the concept of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Birthday Attack?

A

Technique used by an attacker to find two different messages that have the same identical hash digest.

17
Q

What is Key Stretching in regards to increasing Hash security?

A

the weaker key is run through an algorithm to create a longer, more secure key than is normally used

18
Q

What is Salting in regards to increasing Hash security?

A

adding random data into a one-way cryptographic hash to help protect against password cracking techniques.

A “nonce” is used to prevent password reuse