Комментарии:
Danke boet.
ОтветитьI need hash to understand hash
ОтветитьOne thing I don't get about verification is what would happen if there is a hash collision like two very different inputs but same hash value
Let's say "veryoriginalpassword" has the same hash as "mygoodpassword" how would hackers use it to their advantage? Would they be able to access the user just by using the hash? (I have the idea that they would just attack the password, like they just need to bypass the hashing part and be able to validate it, but I don't know)
Hi I need to do this
ОтветитьAs is shown, by the fact that the hash remains 256 in length, there is a potential for more than one input value to compute to the same hash, very unlikely to be found before lockout of a bruteforce attempt, but that is why the length of hashes has become the measure of its strength. So it means you more than likely have the original password value, with high confidence, not 100% certainty.
But I ain't one to gossip... .
It is not a pseudo random number. It is totally derived from the input - if I input 'a' I always get the same output - and using SHA256, you'll get the same answer on every machine.
ОтветитьYes I can decrypt hash😅
ОтветитьPretty sure this is how Heroes three battle algorithm works too. There's only one outcome for every action, in a chain of events.
ОтветитьBonus: there are various input values that will generate the same hash value. But it would be impossible to identify them, even if you knew the hashing algorithm, short of running a brute force database of all possible inputs and their resulting hashes.
ОтветитьThank you!
Ответитьthe only problem with that.. 2 different inputs can generate the same hash... so
ОтветитьBut if the complex algorithms were somehow configured, you could technically decrypt it right?
ОтветитьIsn’t prett much like checksum or similar !?
ОтветитьBut these are not secure right?
When a person hash code of all possible word, he can know the value we're passing right?
Interesting
ОтветитьThank you
ОтветитьThat's not true
It is not one way. Yes, it is extremely hard to decrypt, but technically, it is double
So whats the point of it? If I use a password without hash, you still need to check if the password is the same as you do with the hash
ОтветитьHello sar aapke dwara video gyanvardhak bataya gaya hai bahut acchi baat hai per main Bharat Desh ka Rahane wala hun Bharat ki baat batata hun is Desh mein itne bade bade hacker hain aap kitni achcha password dal dijiye vah Tod dete Hain aur aapka bank account Tak Khali kar dete hain aur sarkari karmchari bhi apradhon mein lete Hain
Ответитьsuggest me some online training course where i can learn Cyber Security and get a job . I am from NOn-CS background
ОтветитьSimilar to crc Circular redundancy check
ОтветитьThats why i love rainbow tables 😅
ОтветитьI never use real words or meaningful passcodes.
Ответить❤
ОтветитьDo you have any recommended resources for learning to design and create hash functions? I tried looking into it once and came back with a bunch of abstract papers explaining the need for them.
🤍
So if I understand this right, when someone types in a password that gets turned into a hash and store it under the email and set that as one email and password combination. And everytime they type their password, that encrypts it as a hash and sees if it matches with the hash that is connected to that specific email address.
ОтветитьYour ending was wrong. You assumed when hashing two passwords results are always the same well, it depends on the type of hash function used, look at a Salted Hash.
ОтветитьWhat the Hash!
ОтветитьMake one about salting
ОтветитьDo you think facebook stored our password as a hash?
ОтветитьAaaah nice reinforcement
ОтветитьWhat about using cryptanalysis to get the hash back to original data, isn't it easy if you know the hash algorithm, so doesn't it become like decrpytion.
Ответитьyou earned a new subscriber :)
ОтветитьSo is hashing used for passwords authentications ?
ОтветитьBut doesn‘t that mean that there is more than one input, that gives the corresponding output? The size of the hash doesn‘t change, so there is a limited amount of information stored in that hash. In this case it should be ~10^77; So, theoretically, if you were to make a bot, so fast, or with so many threads, that it could produce more than these 10^77 possible outputs, at least one output should appear twice. This, at the same time, would mean, that you could give it a random set of numbers/letters/whatever and perchance it would work (it is not very likely (2/10^77), but hey! It‘s worth a shot, isn‘t it?)
ОтветитьAll sudo
ОтветитьJust create complicate password without hasshing still should work
ОтветитьWhat about "You've been changed this password, please make a new one!" or something like that when we resetting password? Isn't that mean 'they' know our old password?
ОтветитьSalam
Heard David Bombal all over when Researching cybersec resources, but mannn, I get it why! From just 1 short! You really are a very good teacher. That explanation style which just so smoothly gets into head. Kudos!
thanks
ОтветитьCould you theoretically decrypt it?
ОтветитьSir I want to hack wifi network of my friend what simple method did I use?
Ответитьso that's How jt helps in Brutforce.🎉❤
ОтветитьOk but it's NOT a 'computer networks only' thing
ОтветитьDude you are too generic. It depends on the type of hashing. There are reversable hashes. You are picking non reversable method and say all types of hashing is non reversable.
ОтветитьIs that how they store passwords in apps?
Edit: you said it literally as I posted my comment. Thanks!
Bro which link is used to hash
ОтветитьSo it still doesn’t secure simple passwords like “p@assw0rd” or “qwerty” as hash for those is know, right?
Ответить我如何从钱包中将我的 89 USDT TRC20 提现到币安请帮帮我 12个钱包恢复短语:『pride』-『pole』-『obtain』-『together』-『second』-『when』-『future』-『mask』-『review』-『nature』-『potato』-『bulb』
ОтветитьDid you know this? Hashing is so important in todays' world!
Ответить