In password cracking, what is the second step after creating a wordlist?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

In password cracking, what is the second step after creating a wordlist?

Explanation:
Hashes are what you compare against the target hash, so after you assemble a wordlist the next step is to hash each entry using the same hash function that produced the target. This converts the plaintext candidates into candidate hashes, allowing a meaningful comparison. If you tried to compare plaintext words directly to a hash, there would be no match. Once the wordlist entries are converted to hashes, you then compare those hashes to the target hash to find a match and reveal the corresponding plaintext.

Hashes are what you compare against the target hash, so after you assemble a wordlist the next step is to hash each entry using the same hash function that produced the target. This converts the plaintext candidates into candidate hashes, allowing a meaningful comparison. If you tried to compare plaintext words directly to a hash, there would be no match. Once the wordlist entries are converted to hashes, you then compare those hashes to the target hash to find a match and reveal the corresponding plaintext.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy