Weak Hashing Algorithms: Outlook PST file CRC32 password cracking example (Hacking Illustrated Series InfoSec Tutorial Videos)
Weak Hashing Algorithms: Outlook PST file CRC32 password cracking example
 

In a previous video I explained the basics of cryptographic hashes. Go watch "A Brief Intro To Cryptographic Hashes/MD5" before this video. In this tutorial, I'll be giving an example of why weak hashes are bad. The example I'll be using is the CRC32 hash that Outlook uses to store a PST archive's password with. The CRC32 algorithm as implemented by Microsoft Outlook is easy to generate hash collisions for, so even if you can't find the original password you can find an alternate one that works just as well.


If the embedded video below does not show RIGHT click here to save the file to your hard drive.



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek