Hashing - what it is, how it's used and why it matters - with MD5 and SHA2-256 examples

  Рет қаралды 11,132

LearnCantrill

LearnCantrill

Күн бұрын

Пікірлер
@ESLwithAlexey
@ESLwithAlexey 2 жыл бұрын
You've done a great job explaining unexplainable! Thanks. Very thorough step by step tutorial based on examples for non-tech human beings.
@LearnCantrill
@LearnCantrill 2 жыл бұрын
thanks for the comment, glad you're enjoying the videos.
@Hari-q5b
@Hari-q5b Жыл бұрын
I understood,, it was simple and straight forward ,, Thank you so much
@tameramin9216
@tameramin9216 Жыл бұрын
great work, great knowledge and great teaching
@LearnCantrill
@LearnCantrill Жыл бұрын
Glad you liked it!
@nassozeebo
@nassozeebo 11 ай бұрын
The hashing of passwords example seems a bit odd to me. It says that the client will hash the password and send the hash to the server. That seems like a bad practice. If an attacked gains access to the hashes of the server, they can just act as the users by sending the hashes that they gained access to, to the server. The better way would be for the client to send the password to the server (encrypted, over https or similar) and for the server to hash the password and then compare that to the stored hash. That way, the attacker won't gain access to anything if they gain access to the hashes (unless they bruteforce them). If the client sends the has to the server, the attacker is free to use the hashes to impersonate the user. When sending the hash from the client to the server, you have basically "gone full circle" and would have the exact same problem as you have when you store passwords as clear text in a database. Great video though. Love it! :) Many thanks. Deserves waaay more views.
@_ABHITIWARI
@_ABHITIWARI Ай бұрын
I thought the same that if that company's server gets hacked then the hacker can get the hash value and by login in theough hash value the server will let him in, it is nothing hut a apassword of password
@cgcrack4672
@cgcrack4672 2 жыл бұрын
Hi,what caused the collision?
@LearnCantrill
@LearnCantrill 2 жыл бұрын
it was artificially generated, check the links attached to the video for details about how this is done. The issue is that it shouldn't be possible with a hashing algo which is working correctly.
@cgcrack4672
@cgcrack4672 2 жыл бұрын
@@LearnCantrill yh,I will check the resources you added, please upload more videos like this. algorithms and data structures and diffrent methods of data processing very informative, thank u
@gauravgoel2597
@gauravgoel2597 2 жыл бұрын
How does the unhashing work on system?
@LearnCantrill
@LearnCantrill 2 жыл бұрын
you cannot 'unhash'
@gauravgoel2597
@gauravgoel2597 2 жыл бұрын
@@LearnCantrill thanks for the reply, understood, basically the actual data is never compared it is the hash value which is stored and compared.
@nassozeebo
@nassozeebo 11 ай бұрын
@@gauravgoel2597 When you need to compare a value to a hash, the server has to first hash the value, using the same method as the has that it will be compared to was hashed. For a login: * user sends a password to the server * the server hashes that password and gets Hash A * the server loads the password hash for the user from the database; Hash B * If Hash A exactly matches Hash B, the user is authenticated And not password needed to be stored in the database, just a hash of the database. The password hashing example in the video is unfortunately a bit misleading.
@joshuaschmidlkofer9784
@joshuaschmidlkofer9784 2 жыл бұрын
Imagine my surprise when I noticed your PowerLevel10k shell prompt - complete with emoji.
@LearnCantrill
@LearnCantrill 2 жыл бұрын
Is there any other way ?
@echongkan01
@echongkan01 8 ай бұрын
Like No. 256 :-p which could be written as # (hash) 256 lol
@datvuong7420
@datvuong7420 Жыл бұрын
total number of data is a, total number of hash values is b, what if a>b. then two pieces of data could have the same hash???
Digital Signatures - Data authenticity and integrity protection
9:27
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
Une nouvelle voiture pour Noël 🥹
00:28
Nicocapone
Рет қаралды 9 МЛН
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
What is a DDoS attack?
14:39
LearnCantrill
Рет қаралды 5 М.
Hashing Algorithms and Security - Computerphile
8:12
Computerphile
Рет қаралды 1,5 МЛН
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
What are VLANS,  TRUNKS & Q-in-Q?
16:45
LearnCantrill
Рет қаралды 29 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 285 М.
Fibre-optic Cables 101
11:40
LearnCantrill
Рет қаралды 8 М.
What is Border Gateway Protocol  (BGP)?
17:30
LearnCantrill
Рет қаралды 15 М.
Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
11:42
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 502 М.
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН