官术网_书友最值得收藏!

Computing the hash of a sample

Without delving into the intricacies of hashing, a hash is essentially a short and unique string signature. For example, we may hash the sequence of bytes of a file to obtain an essentially unique code for that file. This allows us to quickly compare two files to see whether they are identical.

There exist many hash procedures out there, so we will focus on the most important ones, namely, SHA256 and MD5. Note that MD5 is known to exhibit vulnerabilities due to hash collisions—instances where two different objects have the same hash and, therefore, should be used with caution. In this recipe, we take an executable file and compute its MD5 and SHA256 hashes.

主站蜘蛛池模板: 墨脱县| 洪江市| 临城县| 土默特左旗| 西贡区| 沂源县| 南和县| 廉江市| 平顶山市| 青铜峡市| 崇州市| 荃湾区| 南城县| 任丘市| 深州市| 策勒县| 富阳市| 和林格尔县| 青铜峡市| 榆中县| 嘉善县| 仙桃市| 金寨县| 江孜县| 江安县| 鲜城| 贞丰县| 玉树县| 克东县| 崇信县| 孝义市| 包头市| 西平县| 日喀则市| 台南市| 宁夏| 盈江县| 都匀市| 绥德县| 江永县| 遂川县|