Section 25: Hashing Flashcards

1
Q

Hashing

A

One way cryptographic function which takes an input and produces a unique message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MD5 Algo

A

Algo that creates a fixed length 128 bit hash value unique to the input file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Collision

A

Condition that occurs when two different files create the same hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA-1, 2, and 3 (Secure Hash Algorithm)

A

Family of Algorithms - different numbers of rounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RIPEMD

A

Open source and competes with SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HMAC

A

Checks integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Signatures

A

Prevent collisions from being used to spoof the integrity of a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital Signatures should use

A

DSA, RSA, ECDSA, or SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Code Signing

A

Uses digital sig to provide an assurance that the software code has not been modified after it was submitted by the developer (putting an app on the app store)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LANMAN

A

original version of password hashing used by Windows that uses DES and is limited to 14 characters (disabled by default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NT LAN Manager Hash

A

Replacement for LMHash that uses RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NTLMv2 Hash

A

Replacement for NTLANMAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hashing is used to ensure

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two most common hashes

A

MD5 and SHA (MD5 less secure than SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pass the Hash

A

A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mimikatz

A

Automate the harvesting of a hash program

17
Q

Birthday Attack

A

Technique used by an attacker to find two different messages that have the same identical hash value (causes a collision)

18
Q

Collision

A

Occurs when two different inputs to a has created an identical hash digest output

19
Q

Key Stretching

A

Mitigates a weaker key by increasing the time needed to crack it

20
Q

Salting

A

Adding random data into a one way cryptographic hash to help protect against password cracking techniques

21
Q

Bits for hashes

A

SHA-1 creates a 160-bit fixed output. SHA-2 creates a 256-bit fixed output. NTLM creates a 128-bit fixed output. MD-5 creates a 128-bit fixed output.