| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
In a previous video I explained the basics of cryptographic hashes. Go watch "A Brief Intro To Cryptographic Hashes/MD5"
before this video. In this tutorial, I'll be giving an example of why weak
hashes are bad. The example I'll be using is the CRC32 hash that Outlook uses to
store a PST archive's password with. The CRC32 algorithm as implemented by
Microsoft Outlook is easy to generate hash collisions for, so even if you can't
find the original password you can find an alternate one that works just as
well.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast