User credentials were captured from a database during an assessment and cracked using rainbow tables. Based on the ease of compromise, which of the following algorithms was MOST likely used to store the passwords in the database?
A. MD5
Rainbow tables are precomputed tables that are used to quickly crack the password hash. They are particularly effective against unsalted password hashes that are created using weak hashing algorithms such as MD5, which can be cracked quickly.
If the user credentials were captured from a database during an assessment and cracked using rainbow tables, it is likely that the passwords were stored in the database using the MD5 hashing algorithm.
In contrast, bcrypt, SHA-1, and PBKDF2 are considered stronger algorithms that are more resistant to rainbow table attacks, as they use a technique called salting to add randomness to the password hash and make it more difficult to crack.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.PT1-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
lifehacker0777
2 years, 1 month ago