Hashing Flashcards

1
Q

Hash

A

A one-way cryptographic function which takes an input and produces a unique message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MD5

A

Message Digest 5:
Algorithm that creates a fixed-length 128-bit hash value unique to the input file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision

A

Condition that occurs when two different files create the same hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA

A

Secure Hash Algorithm

SHA1
Algorithm that creates a fixed-length 160-bit hash value unique to the input file

SHA2
Family of algorithms that includes SHA-224, SHA-256, SHA-384, and SHA512

SHA3
Family of algorithms that creates hash digests between 224-bits and 512- bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RIPEMD

A

RACE Integrity Primitive Evaluation Message Digest:
An open-source hash algorithm that creates a unique 160-bit, 256-bit, or 320-bit message digest for each input file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HMAC

A

Hash-based Message Authentication Code:
Uses a hash algorithm to create a level of assurance as to the integrity and authenticity of a given message or file
• HMAC-MD5
• HMAC-SHA1
• HMAC-SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing: Digital Signatures

A

Digital signatures prevent collisions from being used to spoof the integrity of a message

Digital signatures use either DSA, RSA, ECDSA, or SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Signing

A

Uses digital signatures to provide an assurance that the software code has not been modified after it was submitted by the developer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LANMAN (LM Hash)

A

Original version of password hashing used by Windows that uses DES and is limited to 14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NT LAN Manager Hash (NTLM Hash)

A

Replacement for LM Hash that uses RC4 and was released with Windows NT 3.1 in 1993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NTLMv2

A

Replacement for NTLM Hash that uses HMAC-MD5 and is considered difficult to crack

NTLMv2 is used when you do not have a domain with Kerberos for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing Attacks: Pass the Hash

A

A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password

Difficult to defend against

Mimikatz:
A penetration testing tool used to automate the harvesting of hashes and conducting the Pass the Hash attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing Attacks: Birthday Attack

A

Technique used by an attacker to find two different messages that have the same identical hash digest
▪ 99% chance of finding a matching birthday in a 57-person group
▪ 50% chance of finding a matching birthday in a 23-person group

Collision
Occurs when two different inputs to a hash create an identical hash digest output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Increasing Hash Security: Key Stretching

A

A technique that is used to mitigate a weaker key by performing multiple processes

WPA, WPA2, PGP, bcrypt, and other algorithms utilize key stretching

bcrypt: Generates hashes from passwords, uses Blowfish to perform multiple rounds of hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Increase Hash Security: Salting

A

Adding random data into a one-way cryptographic hash to help protect against password cracking techniques

A “nonce” is used to prevent password reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly