官术网_书友最值得收藏!

Computing the hash of a sample

Without delving into the intricacies of hashing, a hash is essentially a short and unique string signature. For example, we may hash the sequence of bytes of a file to obtain an essentially unique code for that file. This allows us to quickly compare two files to see whether they are identical.

There exist many hash procedures out there, so we will focus on the most important ones, namely, SHA256 and MD5. Note that MD5 is known to exhibit vulnerabilities due to hash collisions—instances where two different objects have the same hash and, therefore, should be used with caution. In this recipe, we take an executable file and compute its MD5 and SHA256 hashes.

主站蜘蛛池模板: 孝感市| 从江县| 阿勒泰市| 美姑县| 延庆县| 洪江市| 仁布县| 天津市| 北宁市| 海伦市| 灵石县| 新建县| 惠安县| 乌拉特中旗| 黄冈市| 鹤峰县| 乡城县| 蒙山县| 团风县| 海安县| 肥乡县| 清镇市| 蕲春县| 大埔区| 韶山市| 恩施市| 舟山市| 景宁| 武穴市| 靖州| 神木县| 洪泽县| 彩票| 龙泉市| 施甸县| 昌图县| 贡嘎县| 阿鲁科尔沁旗| 长治市| 桃源县| 营口市|