
Sign up to save your podcasts
Or


A password cracking technique known as a "rainbow table attack" uses a unique table, or "rainbow table," to break password hashes stored in a database. Applications usually map passwords utilizing a method known as hashing rather than storing them in plain text. The password that a user supplies while logging in is transformed into a unique sequence of characters called a hash. Next, this hash is compared to the hashes kept on the server. The user gets authenticated and given access to the program if there is a match.
By InfosecTrain5
22 ratings
A password cracking technique known as a "rainbow table attack" uses a unique table, or "rainbow table," to break password hashes stored in a database. Applications usually map passwords utilizing a method known as hashing rather than storing them in plain text. The password that a user supplies while logging in is transformed into a unique sequence of characters called a hash. Next, this hash is compared to the hashes kept on the server. The user gets authenticated and given access to the program if there is a match.

371 Listeners

1,023 Listeners

322 Listeners

138 Listeners

8,010 Listeners

174 Listeners

189 Listeners

202 Listeners

73 Listeners

134 Listeners

169 Listeners

32 Listeners

19 Listeners

0 Listeners

4 Listeners