General Information

Weak Credential Hashing Algorithm

Variants:
Direct 

Also Known As:
Reversible One-Way Hash, Insecure Storage, Weak Cryptographic Hash

Vector Type:
Vulnerability

Relevance:
Generic

Layer:
Application-Level

Platforms:
Any

Target Type:
Application

Affected Mechanisms:
Content Encryption

Invented In:
01/01/1999

Added In:
21/12/2014


Vector Operation Method:
Insecure credential hashing algorithm could be abused by attackers in post exploitation scenarios for successfully performing cryptanalysis attacks on the hashed data, through the use of brute force attacks, dictionary attacks and rainbow tables.


Direct Variant:

Insecure Credential Hashing Algorithm

Also Known As:
Weak Credential Hashing Algorithm

Typical Severity:
Minor

Learn More: