Which table is used to convert huge word lists (i.e., dictionary files and brute-force lists) into password hashes?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

Which table is used to convert huge word lists (i.e., dictionary files and brute-force lists) into password hashes?

Explanation:
Rainbow tables are precomputed tables that map large word lists—like dictionary or brute-force candidates—to their hash values. The idea is to do the heavy lifting once: you generate hashes for many possible passwords and store them so you can quickly match a given hash to a plaintext candidate later. To save storage, rainbow tables use chains: each chain starts with a plaintext, then you repeatedly hash and apply a reduction function to move from hash to a new plaintext, building a sequence and storing only the chain’s first and last values. When you encounter a hash you’re trying to crack, you locate a matching end value in the table and follow the chain backward to recover the corresponding plaintext password. This approach is specifically designed for turning huge word lists into hashes and then reversing hashes efficiently. Note that salted hashes reduce the effectiveness of rainbow tables, since the salt changes the hash for every password; without matching salt, the table won’t help. The other terms listed aren’t techniques for precomputing hash mappings of dictionary or brute-force candidates.

Rainbow tables are precomputed tables that map large word lists—like dictionary or brute-force candidates—to their hash values. The idea is to do the heavy lifting once: you generate hashes for many possible passwords and store them so you can quickly match a given hash to a plaintext candidate later. To save storage, rainbow tables use chains: each chain starts with a plaintext, then you repeatedly hash and apply a reduction function to move from hash to a new plaintext, building a sequence and storing only the chain’s first and last values. When you encounter a hash you’re trying to crack, you locate a matching end value in the table and follow the chain backward to recover the corresponding plaintext password. This approach is specifically designed for turning huge word lists into hashes and then reversing hashes efficiently. Note that salted hashes reduce the effectiveness of rainbow tables, since the salt changes the hash for every password; without matching salt, the table won’t help. The other terms listed aren’t techniques for precomputing hash mappings of dictionary or brute-force candidates.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy