Skip to main content

Questions tagged [sha256]

SHA-256 is a hashing algorithm.

0 votes
0 answers
116 views

I'm trying to attack LUKS header for an assignment. I have to use john and I need to crack the sha256 hash. I made a virtual partition using dd to simulate a storage device on Kali. I encrypted it ...
Sbanz's user avatar
  • 1
4 votes
2 answers
818 views

Apologies if this is a duplicate, I’m having trouble even to find the right words for it. As far as I am aware, password authentication usually works in a way that the server stores a hash of the ...
cdauth's user avatar
  • 153
3 votes
1 answer
258 views

Take the following sequence, for example: hello! = string a SHA-256 of a: ce06092fb948d9ffac7d1a376e404b26b7575bcc11ee05a4615fef4fec3a308b = b SHA-256 of b: ...
zeeshan saeed RIGHT TRUTH REAL's user avatar
1 vote
1 answer
1k views

I’m planning out how I’m going to set up some diy smart outlets in my house, and I’m trying to decide the best way to make them at least mostly secure. My current plan is to use a public http server ...
zmehall's user avatar
  • 121
8 votes
2 answers
2k views

Okta released a security advisory 4 days ago, stating that accounts with username longer than 52 characters can login with arbitrary password under specific conditions. Some people in X/Twitter ...
Reguna's user avatar
  • 83
2 votes
1 answer
910 views

I have setup an AlmaLinux9 server with SSHD. I have also generated a priv+pub key on my workstation, and when I check the algorithm used by my key it shows: ssh-keygen -l -f myprivatekey.pem 2048 ...
TSG's user avatar
  • 189
0 votes
0 answers
319 views

I’m working on a Bluetooth Low Energy lock system and have implemented a challenge-response authentication flow for secure communication between the lock (an ESP32 device) and the user's phone. I'm ...
Sakura M.'s user avatar
0 votes
0 answers
15 views

I use linux and tend to distro hop a lot. I've noticed often that the distributions offer that you verify the download with a sha256sum hash and a GPG key. My understanding is that a file, e.g. a ...
dbqp's user avatar
  • 21
0 votes
1 answer
1k views

I just ran into something strange IMO. I created a RSA Key using nodejs cryptoutils to use with my JWT auth server. What I observer using jwt.io was the following: The last letter of the signature can ...
Gandalf1783's user avatar
2 votes
2 answers
984 views

Background: At my place of work, we're trying to block all unapproved browsers on all Windows machines and the IT Security guys did a search on our internal infrastructure and came up with a list of ...
Fabby's user avatar
  • 133
0 votes
1 answer
144 views

I found that one of our programs uses an sha256 implementation, that produces different hashes for same inputs, compared to standard libraries (in this case compared to node:crypto and Web Crypto API. ...
Jankapunkt's user avatar
-2 votes
1 answer
1k views

SHA256, 64 characters using only 0-9 or lowercase a-f Making 1.15792089E+77 total possible combinations. Is it possible to crack the input for its given hash?
San's user avatar
  • 1
0 votes
1 answer
855 views

I know the string "03a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd" generates the SHA-256 hash 4c0b2d2f119a09b607cb273a745b2b0430d5192e0c4e536f932be5d1a6be5883 using https:...
Aviril Smith's user avatar
15 votes
6 answers
10k views

Is it possible to generate a file with a given sha256sum checksum? That is, reverse the process of a sha256sum checksum. That is, if we have a checksum, can we generate txt file data (need not be ...
Amruth A's user avatar
  • 123
1 vote
0 answers
180 views

I was burning an iso file into the sd card with pi imager and I doubled checked the hash before the burning and after and I got different results sha256sum kali-linux-2022.4-raspberry-pi-arm64.img.xz ...
kaliisohashchanged's user avatar

15 30 50 per page
1
2 3 4 5
14