- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 122字
- 2021-06-24 12:29:02
Computing the hash of a sample
Without delving into the intricacies of hashing, a hash is essentially a short and unique string signature. For example, we may hash the sequence of bytes of a file to obtain an essentially unique code for that file. This allows us to quickly compare two files to see whether they are identical.
There exist many hash procedures out there, so we will focus on the most important ones, namely, SHA256 and MD5. Note that MD5 is known to exhibit vulnerabilities due to hash collisions—instances where two different objects have the same hash and, therefore, should be used with caution. In this recipe, we take an executable file and compute its MD5 and SHA256 hashes.
推薦閱讀
- Visualforce Development Cookbook(Second Edition)
- 計算機圖形學
- Effective DevOps with AWS
- Apache Hive Essentials
- Expert AWS Development
- 工業機器人入門實用教程(KUKA機器人)
- 現代傳感技術
- CompTIA Network+ Certification Guide
- DevOps:Continuous Delivery,Integration,and Deployment with DevOps
- 激光選區熔化3D打印技術
- 在實戰中成長:C++開發之路
- 所羅門的密碼
- 網絡服務器搭建與管理
- 工業機器人集成應用
- 基于人工免疫原理的檢測系統模型及其應用