Weak Credential Hashing Algorithm
Variants:
Direct
Also Known As:
Reversible One-Way Hash, Insecure Storage, Weak Cryptographic Hash
Vector Type:
Vulnerability
Relevance:
Generic
Layer:
Application-Level
Platforms:
Any
Target Type:
Application
Affected Mechanisms:
Content Encryption
Invented In:
01/01/1999
Added In:
21/12/2014
Vector Operation Method:
Insecure credential hashing algorithm could be abused by attackers in post exploitation scenarios for successfully performing cryptanalysis attacks on the hashed data, through the use of brute force attacks, dictionary attacks and rainbow tables.