O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scenario 4 – Hishashin

Hashing is an implementation of encryption that results in an encrypted value that is irreversible. Even if the method used and the key values are known, it is impossible to return to the original value due to rounding and modulus workings. If you want to know how it works, read a book. Oh... wait.

So what can we do with a hash if it can't be reversed? What's the point? Why am I even wasting my time on this hashing rubbish? Well, hashes are used to compare values without showing the unencrypted value at any point. How does that work? Well, the plaintext is hashed and then sent to the database where the correct hashes are stored. If you compromise the database, you only get the hashed value.

So what's the point in my talking ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required