logo
Red wilds
Hash function vulnerabilities
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
    • Through: Where the raccoons burrow and rummage
      • The art of staying where you are not wanted
      • Overflowing the bin on purpose
      • Reverse engineering
      • Steganography
      • Crypto-attacks
        • Field notes from the bin-raider’s handbook
        • Crypto-attack runbooks
        • Picking the locks of logic
          • Secret recipes for digital mischief
          • AES: Faults, flips, and forgery
          • Hash function vulnerabilities
            • DCC Hash
            • DCC2 Hash
            • LM Hash
            • Message Digest 5
            • NT Hash
            • SHA-2 Hash
            • CISCO Salted Password
            • Hash length extension attack
            • SHA-3 Hash
          • Hash function vulnerabilities
            • DCC Hash
            • DCC2 Hash
            • LM Hash
            • Message Digest 5
            • NT Hash
            • SHA-2 Hash
            • CISCO Salted Password
            • Hash length extension attack
            • SHA-3 Hash
          • The curiosity cabinet
      • Slipping through the cracks
    • Out: Where squirrels swipe the crown jewels

    Hash function vulnerabilities¶

    Hash functions are designed to be one-way, but collisions and weaknesses can be exploited. This section delves into methods for cracking hashes, from brute force to rainbow tables. With the raccoon’s persistence, reverse what was meant to be irreversible.

    Not all seals are unbreakable, some just need the right pressure.

    • DCC Hash
    • DCC2 Hash
    • LM Hash
    • Message Digest 5
    • NT Hash
    • SHA-2 Hash
    • CISCO Salted Password
    • Hash length extension attack
    • SHA-3 Hash
    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7