Skip to main content

Questions tagged [rainbow-table]

1 vote
1 answer
138 views

I have been researching and looking into rainbow tables for quite some time now and have come to a dead end regarding starting points and endpoints in rainbow tables. I am confused. Based on the ...
The Death Sidius's user avatar
1 vote
1 answer
294 views

There is two different passwords for a single user. I'm hashing both for future validation. I'm currently using a single unique salt for the user, but each is hashed with a different algorithms (...
user526498's user avatar
0 votes
0 answers
103 views

I have a top level familiarity with Rainbow tables (1 ,2 ) I also understand that salting adds a randomly generated alphanumeric string to each password before it gets hashed and put in a database. My ...
user277528's user avatar
0 votes
1 answer
410 views

This is more of a question on the actual use of the terms rather than the definitions, so my question is this: Are dictionary and rainbow table attacks a type of brute force attack or are they ...
luek baja's user avatar
  • 103
0 votes
1 answer
860 views

Let us imagine a situation where a company stores its user passwords (let's ignore salts, etc for now) using some hash (say sha256) and the company gets breached. All of the username and password ...
xplo1t's user avatar
  • 1
3 votes
1 answer
1k views

I am using some frameworks that store salts inside databases. For example this article shows how Devise stores salt together with the user information. My question is why do people say that salts ...
juaninf's user avatar
  • 465
13 votes
3 answers
7k views

I don't understand this part of the Rainbow table attack. In all my Google searches, it says that a hacker uses a rainbow table on password hashes. But how does the hacker obtain the password hashes ...
user1034912's user avatar
0 votes
1 answer
223 views

Under what circumstances that a Rainbow Table attack is best used?
curiouspanda's user avatar
2 votes
2 answers
1k views

I researched password hashing and cracking and I have some misconceptions: First rule of thumb to create a strong password is to use 10+ combination of digits/upper/lower/symbols to prevent brute ...
Youssef Mohamed's user avatar
2 votes
1 answer
1k views

I'm currently undergoing a penetration testing certification, where I'm asked to : Set up a fully-patched Windows 10 Pro VM (done) Retrieve local password hashes from the SAM database using pwdump7 ...
DisplayNeth's user avatar
0 votes
0 answers
169 views

I see every now and then how hackers stole DB with emails and hashed passwords of millions of users from popular websites and sell it on the black market. I assume that passwords were hashed with ...
mef_'s user avatar
  • 101
3 votes
1 answer
4k views

I'm trying to learn a bit more about the different types of attacks but as far as I understand it, a rainbow table is a large collection of prehashed data which is then compared to hashed data ...
Tcurt's user avatar
  • 33
-1 votes
1 answer
1k views

Suppose I have a database containing hashes. Hashes are obtained from password developed from randomly chosen set of 94 characters such that each password size is of 8 characters. So we have 94^8 ...
user2994783's user avatar
0 votes
1 answer
3k views

Can someone tell me the what length passwords have been hashed, in every possible combination, in rainbow tables? In MD5 and SHA1. Including all characters (letters upper and lower case, numbers and ...
Dimitriou Chemistry's user avatar
0 votes
2 answers
728 views

I have a database table with accounts. I'm using PBKDF2 to create hashes from passwords. The passwords are of the correcthorsebatterystaple type, so we assume they are secure and unique. There are no ...
AndreKR's user avatar
  • 527

15 30 50 per page