Cryptographic attacks | Hash based data structures | Search algorithms | Cryptographic hash functions

Rainbow table

A rainbow table is an efficient way to store data that has been computed in advance to facilitate cracking passwords. To protect stored passwords from compromise in case of a data breach, organizations avoid storing them directly, instead transforming them using a scrambling function – typically a cryptographic hash. One line of attack against this protection is to precompute the hashes of likely or possible passwords, and then store them in a dataset. However, such a dataset can become too big as the range of possible passwords grows. Rainbow tables address this problem by storing chains of possible passwords to save space. Undoing the chains takes significant computation time, but overall this tradeoff makes certain classes of attacks practical. Rainbow tables partition a function (the hash), whose domain is a set of values and whose codomain is a set of keys derived from those values, into chains such that each chain is an alternating sequence of values and keys, followed by a final value. Each item in the chain is derived from the previous item so that the chain may be algorithmically reproduced from the first value in the chain: A key derivation function produces a key from a preceding value, and a reduction function produces a value from a preceding key. The first value and last value of each chain are precomputed and stored, making the chain a row in a virtual table where each even-numbered field contains a value and each odd-numbered field contains the corresponding key. Such a table may be used to discover a secret value (password) given its associated key. It is a practical example of a space–time tradeoff, requiring less processing but using more storage than a brute-force attack which calculates a key on each iteration, but requiring more processing and less storage than a simple table. Use of a key derivation function that employs a salt makes rainbow tables infeasible for recovering a secret value from a key. Rainbow tables were invented by Philippe Oechslin as an application of an earlier, simpler algorithm by Martin Hellman. (Wikipedia).

Rainbow table
Video thumbnail

Stomping bugs in the rainbow table assignment

Found some bugs in the rainbow table assignment. Here I'll walk you through how I found and corrected them.

From playlist C Programming

Video thumbnail

The Hidden Beauty of Rainbows

The Hidden Beauty of Rainbows

From playlist 1 hour Special Talks

Video thumbnail

mandelbrot fractal animation 6

another mandelbrot/julia/mix animation. this time the rainbow colors fit really well, so I left them.

From playlist Fractal

Video thumbnail

How Are Rainbows Formed?

This video explains how are rainbows formed, why are the colors of the rainbow in such an order and under what conditions are they formed. Rainbows are meteorological phenomena caused by few optical processes. We explain these phenomena by showing what happens on a single raindrop and how

From playlist Physics

Video thumbnail

AMAZING RAINBOWS FROM CD SURFACE (EXPLAINED)!!!

The white light from sun reflects on the surface of the cd and, due to diffraction (at the cd diffraction grating), the light spreads and interference to the wall. Each color of white light has a different wavelength for this and is analyzed in the colors the rainbow.

From playlist MECHANICS

Video thumbnail

Periodic Table Overview

Watch more videos on http://www.brightstorm.com/science/chemistry SUBSCRIBE FOR All OUR VIDEOS! https://www.youtube.com/subscription_center?add_user=brightstorm2 VISIT BRIGHTSTORM.com FOR TONS OF VIDEO TUTORIALS AND OTHER FEATURES! http://www.brightstorm.com/ LET'S CONNECT! Facebook ► h

From playlist Chemistry

Video thumbnail

SmoothLife 3D rainbow 1

There are people on the world who know me and what I draw or paint on paper, who fully expect this stuff to be rainbow colored. This is my first try at this, but it's still wrong. The colors have to be all over of course and changing. I will have to look into 3D texture gradient or somethi

From playlist SmoothLife

Video thumbnail

Generating Rainbow Tables With RainbowCrack

Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to generate Rainbow Tables for password hash cracking with RainbowCrack. ⭐Help Support HackerSploit by using the following links: 🔗 NordVPN: https://nordvpn.org/hacker Use the link above or

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Cloud in a Bottle Rainbow

From the LSOP Live Weather Show https://www.lsop.colostate.edu/lsop-live/

From playlist LSOP Live

Video thumbnail

Password Cracking 201: Rainbow Tables

"Rainbow tables" enable malicious hackers to break the encryption protecting password files. This video shows how much more effective rainbow tables are than the "brute force" method of systematically trying to guess all possible password combinations. Hosted by Corey Nachreiner, CISSP. Pr

From playlist Password cracking

Video thumbnail

How To Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack | Session 04 | #cybersecurity

Don’t forget to subscribe! In this tutorial series, you will learn to crack WiFi ( Wireless ) networks. We will use Cow Patty and Air-Crack in this tutorial to crack the WiFi networks. In this project, you will learn how to crack different Wireless networks including WEP, WPA, WPA2 netw

From playlist Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack

Video thumbnail

DEFCON 20: Cryptohaze Cloud Cracking

Speaker: BITWEASIL LEAD DEVELOPER, CRYPTOHAZE TOOLS Bitweasil goes through the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze

From playlist DEFCON 20

Video thumbnail

26C3: Lightning Talks - Day 2 7/14

Clip 7/14 Speakers: Oliver Pritzkow. Sven Guckes 4 minutes of fame 4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3642.en.html

From playlist 26C3: Here be dragons day 2

Video thumbnail

How To Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack | Introduction | #cybersecurity

Don’t forget to subscribe! In this tutorial series, you will learn to crack WiFi ( Wireless ) networks. We will use Cow Patty and Air-Crack in this tutorial to crack the WiFi networks. In this project, you will learn how to crack different Wireless networks including WEP, WPA, WPA2 netw

From playlist Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack

Video thumbnail

How To Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack | Session 03 | #cybersecurity

Don’t forget to subscribe! In this tutorial series, you will learn to crack WiFi ( Wireless ) networks. We will use Cow Patty and Air-Crack in this tutorial to crack the WiFi networks. In this project, you will learn how to crack different Wireless networks including WEP, WPA, WPA2 netw

From playlist Crack WiFi (Wireless) Networks Using Cow Patty and Air-Crack

Video thumbnail

DEFCON 16: Buying Time - What is your Data Worth?

Speaker: Adam Bregenzer, Security Researcher Brute Force attacks are often marginalized as a user issue or discounted as a non-issue because of sufficient password complexity. Because rainbow tables have provided a re-invigoration of this type of attack, maintaining password security is s

From playlist DEFCON 16

Video thumbnail

26C3: GSM: SRSLY? 4/7

Clip 4/7 Speakers: Chris Paget, Karsten Nohl The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM's security hasn't received the scrutiny it deserves given its popularity. This bothere

From playlist 26C3: Here be dragons day 1

Video thumbnail

Dinner Table

The tablecloth is suddenly pulled out from under a dinner setting. Please use eye protection when trying this on your own. The table cloth is cotton. Shot in 300 fps. For more information on our setup see http://sciencedemonstrations.fas.harvard.edu/presentations/dinner-table

From playlist Newtonian Mechanics

Related pages

Key stretching | Inverse function | MD5 | Codomain | Rainbow table | Collision resistance | Domain of a function | RainbowCrack | Password cracking | Hash collision | A5/1 | Crypt (C) | SHA-1 | Hash function | Function (mathematics) | Brute-force attack | Partition of a set | Ophcrack | Pollard's kangaroo algorithm | Salt (cryptography) | Concatenation | MD4 | Key derivation function | Plaintext