In password cracking, what is the second step after creating a wordlist?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

In password cracking, what is the second step after creating a wordlist?

Explanation:
Hashes are what you compare against the target hash, so after you assemble a wordlist the next step is to hash each entry using the same hash function that produced the target. This converts the plaintext candidates into candidate hashes, allowing a meaningful comparison. If you tried to compare plaintext words directly to a hash, there would be no match. Once the wordlist entries are converted to hashes, you then compare those hashes to the target hash to find a match and reveal the corresponding plaintext.

Hashes are what you compare against the target hash, so after you assemble a wordlist the next step is to hash each entry using the same hash function that produced the target. This converts the plaintext candidates into candidate hashes, allowing a meaningful comparison. If you tried to compare plaintext words directly to a hash, there would be no match. Once the wordlist entries are converted to hashes, you then compare those hashes to the target hash to find a match and reveal the corresponding plaintext.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy