Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Next we introduce Hashing and we begin by mapping out exactly what a Hash is, what it, does and where it falls short and why it's a disadvantage being one directional. You'll explore Hash collisions, how they happen, what it takes to recreate them, what happens when there is no integrity and how that is determined by the penetration tester and ethical hacker. We'll also discuss how a Hash is different from a digital signature and contrast against a MAC and PKI.