- Machine Learning for Cybersecurity Cookbook
- Emmanuel Tsukerman
- 122字
- 2021-06-24 12:29:02
Computing the hash of a sample
Without delving into the intricacies of hashing, a hash is essentially a short and unique string signature. For example, we may hash the sequence of bytes of a file to obtain an essentially unique code for that file. This allows us to quickly compare two files to see whether they are identical.
There exist many hash procedures out there, so we will focus on the most important ones, namely, SHA256 and MD5. Note that MD5 is known to exhibit vulnerabilities due to hash collisions—instances where two different objects have the same hash and, therefore, should be used with caution. In this recipe, we take an executable file and compute its MD5 and SHA256 hashes.
推薦閱讀
- 我的J2EE成功之路
- 嵌入式系統應用
- 單片機C語言應用100例
- 基于Xilinx ISE的FPAG/CPLD設計與應用
- 從零開始學C++
- Applied Data Visualization with R and ggplot2
- Linux內核精析
- Photoshop CS5圖像處理入門、進階與提高
- Introduction to R for Business Intelligence
- 工業機器人集成應用
- 大數據素質讀本
- Getting Started with Tableau 2019.2
- Raspberry Pi 3 Projects for Java Programmers
- 洞察大數據價值:SAS編程與數據挖掘
- Python Data Mining Quick Start Guide