Questions tagged [rainbow-table]
The rainbow-table tag has no summary.
54 questions
1 vote
1 answer
138 views
Rainbow Tables - Starting points and Endpoints
I have been researching and looking into rainbow tables for quite some time now and have come to a dead end regarding starting points and endpoints in rainbow tables. I am confused. Based on the ...
1 vote
1 answer
294 views
Is there any benefit to use different salt for different encryption algorithms for same user
There is two different passwords for a single user. I'm hashing both for future validation. I'm currently using a single unique salt for the user, but each is hashed with a different algorithms (...
0 votes
0 answers
103 views
What are the underlying mechanics that make password salting an effective deterrent against Rainbow Tables? [duplicate]
I have a top level familiarity with Rainbow tables (1 ,2 ) I also understand that salting adds a randomly generated alphanumeric string to each password before it gets hashed and put in a database. My ...
0 votes
1 answer
410 views
Are dictionary and rainbow table attacks a subset of brute force attacks or are they seperate?
This is more of a question on the actual use of the terms rather than the definitions, so my question is this: Are dictionary and rainbow table attacks a type of brute force attack or are they ...
0 votes
1 answer
860 views
Making already hashed wordlists of all possible combinations [duplicate]
Let us imagine a situation where a company stores its user passwords (let's ignore salts, etc for now) using some hash (say sha256) and the company gets breached. All of the username and password ...
3 votes
1 answer
1k views
Why people say that salt helps to prevent rainbow table attack? [duplicate]
I am using some frameworks that store salts inside databases. For example this article shows how Devise stores salt together with the user information. My question is why do people say that salts ...
13 votes
3 answers
7k views
How does a 'rainbow table' hacker obtain password hashes in the first place?
I don't understand this part of the Rainbow table attack. In all my Google searches, it says that a hacker uses a rainbow table on password hashes. But how does the hacker obtain the password hashes ...
0 votes
1 answer
223 views
When is it best to use a Rainbow Table attack? [duplicate]
Under what circumstances that a Rainbow Table attack is best used?
2 votes
2 answers
1k views
Can you help me with some misconceptions about bcrypt and salting?
I researched password hashing and cracking and I have some misconceptions: First rule of thumb to create a strong password is to use 10+ combination of digits/upper/lower/symbols to prevent brute ...
2 votes
1 answer
1k views
Why does pwdump7 retrieve LM hashes even though they're disabled?
I'm currently undergoing a penetration testing certification, where I'm asked to : Set up a fully-patched Windows 10 Pro VM (done) Retrieve local password hashes from the SAM database using pwdump7 ...
0 votes
0 answers
169 views
Why people buy stolen databases with emails and hashed passwords of users? [duplicate]
I see every now and then how hackers stole DB with emails and hashed passwords of millions of users from popular websites and sell it on the black market. I assume that passwords were hashed with ...
3 votes
1 answer
4k views
Is there a difference between a rainbow table and a dictionary attack?
I'm trying to learn a bit more about the different types of attacks but as far as I understand it, a rainbow table is a large collection of prehashed data which is then compared to hashed data ...
-1 votes
1 answer
1k views
Calculating Time for a Attack on Password Hashes [closed]
Suppose I have a database containing hashes. Hashes are obtained from password developed from randomly chosen set of 94 characters such that each password size is of 8 characters. So we have 94^8 ...
0 votes
1 answer
3k views
Rainbow tables (MD5 and SHA-1) with all 8 char combinations [closed]
Can someone tell me the what length passwords have been hashed, in every possible combination, in rainbow tables? In MD5 and SHA1. Including all characters (letters upper and lower case, numbers and ...
0 votes
2 answers
728 views
Protect key-streched hashes from rainbow tables?
I have a database table with accounts. I'm using PBKDF2 to create hashes from passwords. The passwords are of the correcthorsebatterystaple type, so we assume they are secure and unique. There are no ...