1/7
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
How to verify integrity
Hashing
Hashing algorithms
MD5
SHA 0 , 1 , 2, 3
What hashing algorithm is used for passwords
SHA-3
Hash collision
Hashing algorithms create same hash for different inputs
Password attacks
attempts to discover password for authentication.
Brute force attacks and dictionary attacks
Attempts to guess every possible combination of words.
thwarted by complexity of passwords
Password spraying
Brute force attack to avoid being locked out due to it attacking multiple users across time intervals