官术网_书友最值得收藏!

Computing the hash of a sample

Without delving into the intricacies of hashing, a hash is essentially a short and unique string signature. For example, we may hash the sequence of bytes of a file to obtain an essentially unique code for that file. This allows us to quickly compare two files to see whether they are identical.

There exist many hash procedures out there, so we will focus on the most important ones, namely, SHA256 and MD5. Note that MD5 is known to exhibit vulnerabilities due to hash collisions—instances where two different objects have the same hash and, therefore, should be used with caution. In this recipe, we take an executable file and compute its MD5 and SHA256 hashes.

主站蜘蛛池模板: 贡嘎县| 湖口县| 浙江省| 平利县| 团风县| 遂川县| 望城县| 获嘉县| 临湘市| 桐乡市| 汉阴县| 连江县| 玛曲县| 陆河县| 郓城县| 漳浦县| 墨脱县| 翼城县| 修水县| 霍林郭勒市| 永善县| 额济纳旗| 宁明县| 成安县| 翁源县| 孟村| 郧西县| 阿勒泰市| 石门县| 壤塘县| 府谷县| 泽州县| 红安县| 德庆县| 天水市| 军事| 富裕县| 益阳市| 五河县| 邮箱| 乡宁县|