Can you decrypt a hashed password?

  Рет қаралды 1,813,004

David Bombal

David Bombal

5 ай бұрын

#shorts #youtubeshorts #password

Пікірлер: 1 900
@davidbombal
@davidbombal 5 ай бұрын
Do you agree with me? Hopefully this answers questions about Hashcat and other stuff mentioned in the comments :)
@tenmaxim1904
@tenmaxim1904 5 ай бұрын
No. Damn it David , are u kidding? For example, if we need to keep info in some secret space we can do the same as mfa - hacking will not help you at all ✊
@musharafhussain2316
@musharafhussain2316 5 ай бұрын
Hey@davidbombal who does the hashing? In an IT world an IT admin would not hash every single file.
@ShinigamiAnger
@ShinigamiAnger 5 ай бұрын
​@@musharafhussain2316nobody hashes evey single file, if you need to hash every single file you might be interested in encryption, since you can configure encryption on a whole disk for example and it will take care of everything. Hashing is used for other purposes, like storing passwords, or in forensics, where yes, you hash even a whole disk, in order to have a "photograph" of the disk (for example to later prove that you did not alter it during an investigation)
@ShinigamiAnger
@ShinigamiAnger 5 ай бұрын
​@@tenmaxim1904you look a bit confused
@ShinigamiAnger
@ShinigamiAnger 5 ай бұрын
​@@musharafhussain2316you don't hash evey single file, if you need that you maybe need encryption, or work in forensics. Hash is used for other purposes, like storing passwords for example
@JimmyS2
@JimmyS2 5 ай бұрын
I think a lot of people confuse hashing and encryption
@amanasati5198
@amanasati5198 4 ай бұрын
​@@blob6591yes, it is. But it is not encryption
@rohanofelvenpower5566
@rohanofelvenpower5566 4 ай бұрын
How? NO BODY upgraded a cisco swithc in their whole life? Every file in software download has a MD5 and SHA sum in the description box.
@callbettersaul
@callbettersaul 4 ай бұрын
​@@blob6591 ... no. As he said in the video, even hashing an entire book will result in a 256 bit hash, which does not contain the book's contents. Therefore it's not even similar to encryption.
@jurajhadzala951
@jurajhadzala951 4 ай бұрын
@@blob6591i mean Deleting the information is technically one way encryption as well
@ichigokurosaki7762
@ichigokurosaki7762 4 ай бұрын
​@@blob6591 something encrypted can be decrypted, Sha 256 cannot be "decrypted" because it is not meant to store data.
@craniusfawkes
@craniusfawkes 5 ай бұрын
If it was possible to get the original data, hash would be the best file compressor of all times 😅
@Luca-tg2wy
@Luca-tg2wy 4 ай бұрын
Or it wouldn't be a compressor at all
@Luca-tg2wy
@Luca-tg2wy 4 ай бұрын
Actually, I am wrong, I guess that you can have a compression a which is revertible with hight probability. For example a compressor that only removes bits
@overbored1337
@overbored1337 4 ай бұрын
It would work if the first match while compressing and decompressing (bruteforcing) would match the inputdata. If not, you could also encode which collision iteration to use instead. Ofcourse this would be incredibly slow and unsolvable by todays computers, but Im sure it would cover a large set of Kolmogorov complexity.
@Luca-tg2wy
@Luca-tg2wy 4 ай бұрын
@@overbored1337 suppose a compression algorithm which simply truncate to 256 bits. Now you ask to compress a data of 257 bits. You can revert with a probably of 1/2 which is high. If you give it a input data of more thar 256 bits you can say that at worse you do it with a probability of 1/2^k where k =input size - 256. However you can still make the argument, that since you know the previous bits in clear text, knowing the next ones is not 1/2 at each time, but higher than that.
@overbored1337
@overbored1337 4 ай бұрын
@@Luca-tg2wy not sure where you're getting at, but yeah im not saying that it would work on any data, but depending on the input, how its preprocessed and verified (given unlimited computational power). Atleast thats how i view it but I could also be wrong.
@Forficulas
@Forficulas 4 ай бұрын
I think you should also mention that if the hashes matches it doesnt mean that you got the original input. Hash collisions are inevitable if you allow hashing of bigger data than the size of the hash. (pigeon hole principle)
@s.mohammadmousavi4684
@s.mohammadmousavi4684 4 ай бұрын
Was about to comment this, great explanation.
@RampageG4mer
@RampageG4mer 4 ай бұрын
Yes, but that doesn't matter to the attacker
@s.mohammadmousavi4684
@s.mohammadmousavi4684 4 ай бұрын
@@RampageG4mer actually it should. If you find a collision, you can use that even if not the correct password to login to that one system that you were trying to get into, however, even if the user used the same password for other accounts the collision will not work there because the salt is different and the produced hash from the combination of the collision and the new salt won't match. So ideally the attacker would want to get the real password not a collision that results in the same hash.
@XiaolinDraconis
@XiaolinDraconis 4 ай бұрын
he kinda did in the first video, this is about a specific point. he already mentioned what y'al did but also mentioned that just because the data isn't same as long as it does give the same hash then two different passwords can be used for the same account.
@RyanGrissett
@RyanGrissett 4 ай бұрын
Its not about the size of the hash but the number that it represents. It is an unimaginably large number and with a proper collision resistant hashing algorithm you will never get a collision in your lifetime with today's compute power. The chances of it happening are just too low. Unimaginably low. Collision resistance is due to how well the hash outputs are uniformly distributed. No data that we put into a hashing algorithm has a data size anywhere near being larger than the number a 256 bit hash can represent. Even with a quantum computer that can reduce the effectiveness of a hashing algorithm from 256 bits to effectively 128 bits, its still not going to be an issue. That's why today's hashing algorithms are so secure and considered quantum resistant. With something like Sha3_256 or blake3, that is properly collision resistant, the 256 bit digest represents more unique combinations of inputs than humanity could generate before the death of the solar system.
@MrBrannfjell
@MrBrannfjell 4 ай бұрын
For added hash security, you could salt the hash. Unsalted hashes has rainbow tables available which lets you query a hash (in etc an SQL table) to obtain first available password for that hash. Salting a hash means you append etc the account id or registration date to the password before hashing it, making it much more resistant to rainbow tables.
@Chinoman10
@Chinoman10 4 ай бұрын
Even 'better' than salting is adding pepper as well (and no, I'm not joking or being sarcastic, look it up 😅). Pepper is typically (or only?) used when salt is already being used as well, it's essentially just another security 'layer/step'.
@deshonekizer5943
@deshonekizer5943 4 ай бұрын
@@Chinoman10can you explain how pepper works? Im familiar with salting hashes but is it basically another layer of salting? Also is it necessary?
@Chinoman10
@Chinoman10 4 ай бұрын
@@deshonekizer5943 essentially, by storing 'an additional salt' on a different table (or entirely different DB altogether, on a separate DC, etc.) you are protecting that data against a physical breach or a localized remote with access to that specific system. Imagine you use AWS for one and GCP for the other; if your AWS root account gets compromised, the data is still unbreached as they'd need access to the GCP credentials as well.
@biigsmokee
@biigsmokee 4 ай бұрын
rainbow tables in sha256? what year and planet are you on
@Mostlyharmless1985
@Mostlyharmless1985 3 ай бұрын
@@biigsmokeeyou can use a rainbow table on any hash algorithm. It’s a fundamental flaw/feature of hashing based on pigeonholes. Sha256 is not immune to rainbows. Like, literally you just saw a rainbow attack happen in front of you.
@McLOVIN-vf7tp
@McLOVIN-vf7tp 5 ай бұрын
Good explanation. Thank you! This is also the reason why the EU Privacy Policy doesnt allow web services to store passwords anymore, but their hashes.
@davidbombal
@davidbombal 5 ай бұрын
Thank you. Good example that.
@robeaston4063
@robeaston4063 5 ай бұрын
Hopefully salty hashes.
@lukassnr1503
@lukassnr1503 5 ай бұрын
It makes no difference. It might take longer to crack it but having access to hashes allows us to do the cracking offline entirely
@McLOVIN-vf7tp
@McLOVIN-vf7tp 5 ай бұрын
@@lukassnr1503 well Good luck with that 😅
@McLOVIN-vf7tp
@McLOVIN-vf7tp 5 ай бұрын
@@robeaston4063 its not obligated by law, but yeah salty hashes is the proper way to store password hashes :)
@romi089
@romi089 4 ай бұрын
Good explanation! However, an important point was left out: two different input values ​​can produce the same hash. This means that the password may be found, or a random value that results in the same hash.
@satibel
@satibel 4 ай бұрын
Depending on the hash, there might be a 1:1 relationship (injective function) that repeats every time the input is the size of the hash (so every bit you add usually mutliplies by 2 the number of possibilities) So if you have a function that has an output that is 256 bit long, each hash corresponds to a single input that is 256 bit in length and a single input that is between 0 and 255 bit in length. (And 2 inputs that are 257 bit in length) Which means that if the password length is less than the size of the hash, you will exactly get the password (assuming no salt/pepper) Note that most algorithms pad inputs that are shorter than a given size, so for sha 256 1 followed by 511-the size of your password 0s and then your password is the same as your password. Due to padding the exact number of bits might be off by a bit, since a prefixed 0 is the same as not having it, but the idea is the same.
@Reacher6207
@Reacher6207 3 ай бұрын
People are still confusing Hashing with Encryption. Hashing for data integrity and Encryption for data confidentiality, keep that in mind.
@andystovell
@andystovell 4 ай бұрын
Very well explained. The only caveat not mentioned is that just because the hashes are the same, doesn't neccesarily mean that the input data is the same, as multiple pieces of data may share the same hash (these are called collisions) but, its incredibly unlikely, especially from the context of brute forcing. Edit: Wow, this blew up! Lots of good discussion and points below too!
@whasian2007
@whasian2007 4 ай бұрын
Was just about to comment this same thing lol
@Mister.BreadBoard
@Mister.BreadBoard 4 ай бұрын
lol wow so you would accidentally find a different word that the system would accept as a password because the hashs match 😂
@whasian2007
@whasian2007 4 ай бұрын
@@Mister.BreadBoard well yeah that’s what rainbow tables are for when systems don’t salt their hashes
@Mister.BreadBoard
@Mister.BreadBoard 4 ай бұрын
@@whasian2007 oh so it still checks the provided password. Darn 😂
@AndersJackson
@AndersJackson 4 ай бұрын
​​@@Mister.BreadBoardno, it check hash values. If you hash (with salt) your password, you send the hash to the other side. There they compare the hash value with the stored hash value. If the same, you have entered the right password on your side. But you never send the password in clear, and the other side only store hash value, not the password. So the you are the only one that know the password. Not the one receiving the hash value, and not anyone then listen to the communication.
@Webberjo
@Webberjo 5 ай бұрын
People really think they discovered the cheat code to storage space.
@salsichalivre5401
@salsichalivre5401 4 ай бұрын
It is a difficult position. You can’t teach somebody ignorant in the very basics, which may be the majority of the people passing by such video. At the same time, I’d you explain this to people that knows it, doesn’t make too much sense that effort. That is why such videos are difficult to settle to the correct public, that is a person ready to learn that, knowing the basics up to there.
@John-lw7bz
@John-lw7bz 4 ай бұрын
Unlimited compute and you do basically. Unless there are also unlined hash clashes 😅.
@larko2933
@larko2933 4 ай бұрын
@@John-lw7bzno you don’t. hashes aren’t some sort of magic black hole that outputs data into small sized hashes just like that. hashes are also storage so you inevitably lose some information which means you get hash clashes
@metalwolf112002
@metalwolf112002 4 ай бұрын
technically, you could store a bluray as a 256kb hash and use that to "restore" the original image, but how powerful of a computer would you need to be able to go 0...000,0...001,0...010, 0...011, etc. to figure out the actual data that was once held? Dont forget that due to hash clashes, you also have to verify you have the correct data. So in all practicality, it is impossible. And yes, if you have even the faintest clue of what hash salting is... you should know there are "unlimited" hash clashes since a string of X with a salt of Y might produce the same hash as a string of A and a salt of B.
@gabusdeux
@gabusdeux 4 ай бұрын
​@metalwolf112002 extremely powerful artificial intelligence (real) on a quantum supercomputer (future)
@_tr11
@_tr11 4 ай бұрын
I kept asking myself about this and you just come outta nowhere solve my question :D
@toggenation
@toggenation 4 ай бұрын
Seriously good information always on this channel. Flipper used to a dolphin for me until I watched this channel.
@hotdailymemes5129
@hotdailymemes5129 5 ай бұрын
Your explanation was very clear the first time. They didn't just understand.
@TrollDecker
@TrollDecker 4 ай бұрын
They probably didn't want to either. They just wanted to _sound_ clever with none of the effort.
@pojomcbooty
@pojomcbooty 4 ай бұрын
Yip! Hashing a big file was a good example though, might help some people understand.
@ImDGreat
@ImDGreat 4 ай бұрын
​@@TrollDeckercan you explain the difference between hash and encryption? sorry im still a noob
@vaishakhgk2006
@vaishakhgk2006 4 ай бұрын
​@@ImDGreatWhen you encrypt normally there will be a key and you can use that key to decrypt the data sp if you know the key you can get the original data but in hashing its impossible to retrieve data from the hash, the only way to verify hashed data is comparing the hashes
@ImDGreat
@ImDGreat 4 ай бұрын
​@@vaishakhgk2006oh, thanks!
@maxmustsleep
@maxmustsleep 5 ай бұрын
The issue is when passwords have been leaked so more common phrases and their hashes are already on a list which can make it easier for hackers to get into an account. This is also why the salt and pepper concept exists where you add another random string to the password that gets stored separately but always stays the same to make the hash unrecognisable. Pepper is just adding another random character each time which means it tries 30-ish combinations on every login to further jumble the hash.
@danilomazur9424
@danilomazur9424 4 ай бұрын
Quickest and best explanation I've ever seen. Thank you
@MrAlazawi
@MrAlazawi 4 ай бұрын
Thanks for making a video clearing this up, I was one of those who said you were wrong (only because of the incomplete explanation), and now Im saying you are right :) Big fan
@pijesz
@pijesz 5 ай бұрын
It's like cooking. You cannot reverse the process to know the ingredients but you can guess and guess until you get the correct recipe.
@zekiz774
@zekiz774 5 ай бұрын
Nah. You could reverse engineer the recipe. You can't do that with a hash. Cooking is more like compiling a program. You can't get the original source code but you can look into the ingredients and make something similar out of it.
@ShinigamiAnger
@ShinigamiAnger 5 ай бұрын
​​@@zekiz774you started good, but ended doing his same mistake. It's not even comparable to coding, you can reverse engineer a program and look at the assembly code. You can't do that with a hash, even if you look into the algorithm that was used to hash the original data. What you can do is simply keep hashing data and compare the result with a hash that you want to "crack"
@zekiz774
@zekiz774 5 ай бұрын
@@ShinigamiAngercooking is pretty comparable to writing a program in a compiled language. Doesn't really have anything to do with Hashing tho
@ShinigamiAnger
@ShinigamiAnger 5 ай бұрын
​​@@zekiz774 of course it is, but we are talking about hashing here, that is why my clarification
@goofballbiscuits3647
@goofballbiscuits3647 5 ай бұрын
​@@zekiz774 That analogy doesn't work at all.
@epgendreau
@epgendreau 5 ай бұрын
This clip was very informative and easy to understand. Well done and thank you!
@davidbombal
@davidbombal 5 ай бұрын
Thank you. Glad you enjoyed it!
@alighanati5453
@alighanati5453 4 ай бұрын
I love how you explain things even though I know the subject
@stevem437
@stevem437 4 ай бұрын
I’ve been a malware analyst and cybersecurity manager since 2009… Hashing is a one way function. The people arguing clearly know absolutely nothing about the subject.
@codewithdrew
@codewithdrew 4 ай бұрын
Please advise all of your clients to use MD5 or SHA1 as their hashing algorithms and see how long you keep a job for
@satibel
@satibel 4 ай бұрын
While it's in theory a one way function, in practice some hashes can be reversed to one of the possible inputs. And collisions are even possible. So if you use the md5 hash of a program to be sure that there hasn't been a mitm attack, well, the mitm could have downloaded the program, added a virus, and modified it to generate a collision, which means the md5 hash is the same but the program you downloaded has a virus. And in the case of passwords, since the password is shorter than the hash in most cases, you can usually find the original password from a hash, as it's gonna be the first string to match the hash in the majority of cases. And in most cases where a list of hashes is used for cracking, having a few passwords that are just a collision doesn't matter.
@stevem437
@stevem437 4 ай бұрын
@@satibel So first of all, I started my career as a malware analyst for the NSA. I have a ton of experience in this area. Hashes cannot be reversed. The fact that you say collisions are possible supports the fact that they cannot be reversed And no, no one is "adding a 'virus' to a program and then adding code to generate a collision"... This literally has never happened. And you're saying that passwords can be obtained from hashes? What is your background? You have no idea what you are talking about.
@satibel
@satibel 4 ай бұрын
​@@stevem437if you have a hash of a password (that is in a rainbow table) that corresponds to an account, you can usually get the password, so for all intents and purposes you have gotten the password from the hash. It doesn't usually work for a targeted attack (assuming a password that isn't weak), but it works for a broad attack like a leaked db from a random website. If you get 50% of the accounts, or even 1% depending on the size of the userbase, it's quite a lot of passwords. Yes it assumes that users reuse their passwords to have any usefulness, but that's a safe assumption on a large dataset. And yes hash collisions aren't practical, in most cases it's easier to just use social engineering or a weakness in the hardware/software that does the computation (e.g. the buffer overflow in the tegra on the Nintendo switch) Like it's way easier to also change the displayed hash if you can modify the program in transit. But it's technically doable by someone with enough funds, though at this point you might as well bribe someone.
@justind4615
@justind4615 4 ай бұрын
@@codewithdrew sorry but md5 still cant be irreversible
@baronvonbeandip
@baronvonbeandip 5 ай бұрын
We call this injection. If there existed a bijection (surjection and injection) between each hash and all possible inputs, it would be invertible and, therefore, crackable from only the outputs. If you reversed the SHA256 for a particular output, you would receive a field of inputs since its 'many-to-one'
@Luca-tg2wy
@Luca-tg2wy 4 ай бұрын
NON-injectivity
@michaeljones1686
@michaeljones1686 4 ай бұрын
There's a bijection if you restrict the input to being also 256 bits
@wagaapoy9219
@wagaapoy9219 4 ай бұрын
If a hash was reverable it would defeat the point of a hash
@stt.9433
@stt.9433 4 ай бұрын
That was a fantastic explanation. Hashing is a deterministic one way function. So if you have the same output than you can say you have the same input, that doesn't mean you can reverse the output.
@triatom
@triatom 4 ай бұрын
Very clear explaination and without going into maths. 👌 You might can explain salting next.
@aPEDESTRIAN
@aPEDESTRIAN 4 ай бұрын
It is also worth noting that it is possible to get the same hash with 2 different inputs; Getting the same hash doesn't always mean you have the same original data
@davidlindskoghedstrom4737
@davidlindskoghedstrom4737 Ай бұрын
I guess it's also worth mentioning that a hash can be gotten from infinitely many inputs, unless you limit the length of the input.
@personalviews6950
@personalviews6950 Ай бұрын
Yes but if you get the same hash, you can access the account or whatever even without the original data right?
@davidlindskoghedstrom4737
@davidlindskoghedstrom4737 Ай бұрын
@@personalviews6950 not necessarily. Read up on "salt" in cryptography if you're interested.
@happyducky9872
@happyducky9872 11 күн бұрын
​@@personalviews6950there are defenses against pass-the-hash attacks, but yes thats the idea
@kugelblitz1557
@kugelblitz1557 5 күн бұрын
​@@personalviews6950 depends on what's stored where, but maybe. Passwords have a very small risk of clashing though, because they're not usually that long.
@Kabelman
@Kabelman 4 ай бұрын
No. Hash functions, in a broad computational sense, are defined by their ability to take input of arbitrary length and produce a fixed-size output. This characteristic is fundamental to various applications, such as indexing in data structures like hash tables. The crucial point to note here is that reversibility in the context of general hash functions is a matter of design and intent rather than an inherent impossibility!!! As long as the original input data is within the constraints of the hash function's output capacity, there exists the potential for these functions to be reversible, possibly through the function itself or other means. Contrastingly, !!CRYPTOGRAPHIC HASH!!!! functions are a specialized subset of hash functions with additional properties designed explicitly to enhance security. Among these properties is the principle of irreversibility-or more technically, pre-image resistance. This means that it should be computationally infeasible to reverse the hash function, i.e., to find the original input given the hash output. The design of cryptographic hashes aims to negate the possibility of reversibility, ensuring that even if the input data fits within the fixed output length, reversing the process to retrieve the original data should be impractical. You don't seem to grasp the distinction of those: not all hash functions are created with the same objectives, and thus, they vary in properties such as reversibility. So you are wrong. Hash functions can be reversed in some cases.
@horrorgurke6669
@horrorgurke6669 21 күн бұрын
A hash function in general is not injective (multiple inputs can get mapped to the same output). Thus it is also not bijective, hence it can't be reversed. No need for a multiple paragraph essay to show that he is correct...
@Kabelman
@Kabelman 21 күн бұрын
​@@horrorgurke6669Well, you generalize and come to the wrong conclusion. I tried to explain why this is wrong. I guess I failed in that, maybe due to my poor explanation or your lack of careful reading. I was a researcher in cryptographic hash implementation for five years, and I am certain he is wrong. He and you are generalizing something that cannot be generalized. Oxford definition of a hash function: "noun: COMPUTING noun: hash function; plural noun: hash functions a function whose output values are all the same number of bits in length, especially one used to encrypt or compress data or to generate indices." The devil is in the details. Be precise with your words; one of the most important thing in computer science and mathematics is precision.
@hassanaoutof4148
@hassanaoutof4148 20 күн бұрын
Man, some people just need to be the contrarian for no reason, You're technically correct about the broader definition of hash functions. However, in the context of cybersecurity which is the main theme here, when we discuss hashes, we're exclusively referring to cryptographic hash functions. These are designed with security in mind and are intentionally one-way functions. Please, next time take a moment and consider the possibility that this person might be right. If I speak up, I could be reacting out of my own ignorance of the topic he's referring to. This way, you can avoid being contrarian when there's no need.
@cdlowe1986
@cdlowe1986 2 ай бұрын
😂 David, you are the man! Some people watch a couple KZfaq videos on "hacking" and all of a sudden, they're pros lol. Take the time and research anything and everything you can, just like David. Keep it up man, love your videos
@arun-s
@arun-s 4 ай бұрын
Good explanation. Please also include collision when you talk about this
@Brainstorm4300
@Brainstorm4300 4 ай бұрын
Bruh if people could reverse hash and get the original message, we'd be in big trouble 😂
@Mister.BreadBoard
@Mister.BreadBoard 4 ай бұрын
Actually I think that would be a huge jump for humanity 😂 Imagine hashing terabytes of data into a small hash and getting it back. Sure, we'll have to look for alternatives for checking passwords but that seems like a low price for storing all that data in a hash 😂
@asandax6
@asandax6 4 ай бұрын
Who needs privacy when I can have all of Netflix in a QR code?
@thanhnguyenviet3382
@thanhnguyenviet3382 2 ай бұрын
No we dont. Acutally, some obsolete hash athgorithsm can be reversed. However, it is a very time consuming process and needs a hugh amount of computing power. It also only works for a short piece of data like a password. So here is why it does not matter. If you can reverse a hash to a password but in maybe 5 years, that piece of information is irrelevant by the time it is discovered because the password has been changed many times over. Thats why in many big techs, they force password changing in about 3 months.
@thanhnguyenviet3382
@thanhnguyenviet3382 2 ай бұрын
@@asandax6 The question is how long does it take for you to reverse that QR code back to Netflix? 10 years ,50 years or 100 years?
@asandax6
@asandax6 2 ай бұрын
@@thanhnguyenviet3382 100 Years isn't so bad considering you've stored over 100TB in just 64B if you're using SHA-512.
@guitarman840
@guitarman840 4 ай бұрын
Yes and no - you will obviously get the same hash with the same input, but you can also get the same hash with other inputs. I'm sure you're aware, but for the uninitiated, these are called hash collisions (in hash tables, anyway) EDIT: I can't believe I'm arguing with toddlers on the internet, but here we go... To clear up the "confusion" regarding my comment, I'm not responding to the video's title like some sort of half-wit who reads a book title and thinks he's absorbed the content. (For clarity, that's definitely an insult directed at some of you commenters) Instead, I'm referring to the comment made in the video, and I quote "I'm checking if the hashes are the same which means I have the same original data as you" - That claim is BLATANTLY FALSE!!! WATCH IT AGAIN!!! What I was trying (and failing, apparently) to communicate is that YES - The same input will hash to the same value, but NO it does NOT guarantee you have the same input. Multiple values CAN RESULT IN THE SAME HASH - this is called a HASH COLLISION. To all of you arrogant children who want to puff out their chest attempting to appear intellectually superior - You should be embarrassed! You've proven that you rank somewhere between a soggy bowl of cereal and a seahorse. Congrats....
@garydunken7934
@garydunken7934 4 ай бұрын
To the question of whether or not one can retrieve the original data, the answer is NO. Not Yes and No. Hash collision is a different topic, which he acknowledged with a red highlighted note at the end of the video.
@guitarman840
@guitarman840 4 ай бұрын
@@garydunken7934 I didn't say a damn thing about retrieving data from a hash, gary, I very clearly only addressed his comment about "if you get the same hash, you know you have the same input data" which is categorically false.
@MsHojat
@MsHojat 4 ай бұрын
Yeah and I remember several years ago where researchers discovered a method to reliably generate hash collisions for SHA-1 hashes of files. (meaning generating a different files that shares the same hash as a target file)
@CorrosiveCitrus
@CorrosiveCitrus 4 ай бұрын
Video title: "Can you decrypt a hashed password?" Your comment: "Yes and no" Actual answer: "No"
@satibel
@satibel 4 ай бұрын
​​@@CorrosiveCitrusif you have a lookup table for hash -> plain text you're likely to find the password by looking up the hash, if there's no salt and pepper. And you have the password that corresponds to an account, which is for all intents and purposes the same as decrypting the password.
@Quantum_64
@Quantum_64 20 күн бұрын
In short, you can't reverse it, but you can check that it hasn't changed. You "can" however use a Rainbow Table and check hashes with your own hashes to "reverse" it and get the data. But that would mean that you ALREADY have it, hence there being NO WAY to reverse it and why it's a one way function.
@easysolution9005
@easysolution9005 21 күн бұрын
This is the best explanation of hashing I have ever seen
@achinti9
@achinti9 4 ай бұрын
A small correction is that two pieces of data may have the same hash. Even if you get a matching hash, you may not have the same original data. This is known as a birthday attack and is a problem with some older hash types like md5
@7hndr
@7hndr 4 ай бұрын
Though in most implementations it doesn’t matter if the data is the same, since most procedures like only check for the hash equality anyway. And the birthday attack only applies if you were to choose both pieces independently. In his example he specifically looks for a collision to a given piece of data. But even the birthday attack is not that powerful and rather useless on its own.
@asandax6
@asandax6 4 ай бұрын
​@@7hndr Especially when salting is involved.
@shortnr
@shortnr 4 ай бұрын
As far as I understand, if your data can be represented by the same (or fewer) number of bits as your hash, only then are you guaranteed to match data when two hashes match. If you have 257 bits of data, there exists at least two unique data values that would result in a hash collision.
@EskChan19
@EskChan19 4 ай бұрын
That's correct. However even with lower bits you can't reverse the hash. You can brute force inputs until you get the same hash and then you are guaranteed that this is the original input, but that is not "reversing the hash".
@shortnr
@shortnr 4 ай бұрын
@@EskChan19 oh, I know. I was just saying that you're only guaranteed a unique hash if the data you're hashing has fewer bits than your hash does.
@JonHaa87
@JonHaa87 4 ай бұрын
@@shortnrYou're never guaranteed a unique hash. "password" and a short other word like "bunny" could both result in the same hash, at least theoretically. The chance for a collision is super low of course, but it's not impossible.
@thanhnguyenviet3382
@thanhnguyenviet3382 2 ай бұрын
@@EskChan19 Hey, you are thinking of reversing the hash in a very narrow way. As long as I get the original piece of data, that means I have successfully reversed it. Method does not matter. The result is the proof.
@cptunidentified
@cptunidentified 3 ай бұрын
One of the best short descriptions of hashing
@OPatron24
@OPatron24 4 ай бұрын
Beautifully explained. This man simplified what is known as a clash for you guys
@jakubedzior
@jakubedzior 3 ай бұрын
Actually, comparing hashes does not mean the original inputs are the same, rather that they are very very likely to be the same. There's a chance of 1 / 10^97 with SHA-256 of what's called a hash collision, where the same 2 inputs give the same hash value
@carloslemare6060
@carloslemare6060 4 ай бұрын
The hash function has no inverse because it relies on the modular function that in mathematics has no inverse.
@OneAndOnlyJackSchitt
@OneAndOnlyJackSchitt 4 ай бұрын
To expand on why it's not reversible: If you take 10 and do an integer division by 3, you get 3 with a remainder of 1. In proper math terms, 1 is the modulus of 10 and 3. Having only 1 and 3, you cannot derive that the remaining input was 10 and not 7. When dealing with modulus arithmetic, multiple math problems can result in the same value: 10 \ 3 = 1 7 \ 3 = 1 4 \ 3 = 1 (In programming, you typically use a backslash \ to denote modulus as opposed to a forward slash / to denote division.)
@ZeroPresicion
@ZeroPresicion 4 ай бұрын
LEGEND, goes deeper explains and informs
@KCKingcollin
@KCKingcollin 3 ай бұрын
I love it when people without even a single IT cert to their name will go online and tell people they're wrong without actually understanding it themselves
@Channel-iu6de
@Channel-iu6de 2 ай бұрын
This makes so much sense, as soon as you give the example of hashing a book or an iso, it becomes quite clear that a 256bit hash would not be able to give us a book, otherwise why the hell would we not just hash the entire internet and back it up as a tiny little 256bit hash, meaning we could store tons of info in a text file.
@joaooliveirarocha
@joaooliveirarocha 4 ай бұрын
Hash tables yeah, that's why there's usually "salt" included before the hashing.
@memetech-
@memetech- 4 ай бұрын
That’s one heck of a compression algorithm
@Ash_Prints
@Ash_Prints 4 ай бұрын
You explained this so well for someone like me, thanks
@ChrisP872
@ChrisP872 Ай бұрын
and that bit at the end is why we add "salt" in a unique way and also store the "salt"
@claudiucogalniceanu2297
@claudiucogalniceanu2297 4 ай бұрын
I always wondered how hashing works, and when I learned about this in a python course I took some time ago, my mind was blown.
@adamschehl8346
@adamschehl8346 2 ай бұрын
Cool thing about hashing is you can still search for the hash of a specific thing and still find it but still maintain confidentiality/privacy. Providing you are searching in a system that requires all hashes are unique.
@RusuTraianCristian
@RusuTraianCristian 2 ай бұрын
That’s why alongside hashes, we need to also create and add salt on the back, for example. All code breaks, this way is just harder to break it.
@RayCarrot
@RayCarrot 4 ай бұрын
I think it'd be really funny making a video compilation of every time you predicted something in this series and then showing it actually happen 😂 Like it's happened an insane amount of times now haha
@barryhomeowner9293
@barryhomeowner9293 27 күн бұрын
The way I heard it explained is if you multiply two prime numbers, that's relatively easy to do. You can't then look at the resulting number and know which numbers were multiplied together to reach it.
@daniel-marcinkowski
@daniel-marcinkowski 3 ай бұрын
Wow, explained calmly and competently to what seems to me like trolls.
@nunoromao6875
@nunoromao6875 3 ай бұрын
Simple explanation! Thank you!
@icastmoustache9387
@icastmoustache9387 4 ай бұрын
tbf you just explained exactly what hashing is used for, and ironically people kind of understand but vehemently defend their minor misunderstanding. oh humanity, always the entertainer.
@russelllapua4904
@russelllapua4904 4 ай бұрын
You're right. We use a hashing function in our work for a particular PCI-DSS scenario, I once asked if we could reverse hash to find out what the customer was doing wrong in creating it and it's not possible to do.
@ajsworld77
@ajsworld77 4 ай бұрын
Well explained with the book hashing!
@Hash-6624
@Hash-6624 4 ай бұрын
As a Hash i can confirm this man is Hashing correctly
@faustinogonzales7868
@faustinogonzales7868 4 ай бұрын
Learned this in digital forensics. Easy peezy
@oneaboveall3374
@oneaboveall3374 2 ай бұрын
True, even many different things can generate same hash code, though It's really rare in a good hash function.
@bringerod5141
@bringerod5141 4 ай бұрын
A powerful tool I would love for society to use more. For example sharing medical data between hospitals are sometimes not possible due to the security risk but if people would drive around to hospitals and making sure that the hashes get rotated and distributed in a safe manner I think it would make things smoother and safer.
@CanDoo321
@CanDoo321 2 ай бұрын
If hashed worked the way these guys thought, it would be the greatest compression algorithm ever!
@The_True_J
@The_True_J 12 күн бұрын
A professor in one of my CS classes explained it pretty simply. The space of all combinations of 256 bit strings is large but every string regardless of length outputs a 256 string and the list of every possible string is larger than that. That means there is overlap. This it's equivalent to saying x² = y. If I give you that X = 2, then Y must = 4. But if I say that Y = 4, you don't know if X = 2 or -2. Two different inputs can have the same output.
@TheXev
@TheXev 4 ай бұрын
With older encryption schemes, you would sometimes see the same data produce the same hash, but I'm not sure as the specifics that help prevent that today. I seem to remember Windows NT 4 passwords were pretty easy to reverse hash, but all you would need is a matching password data, not necessarily the same hash. I imagine that is still possible with current hash algorithms, but it may take a fair bit longer to engineer a match.
@nikolaoslamprou9266
@nikolaoslamprou9266 4 ай бұрын
People love to disagree. I doubt if most of them know the security properties of a hash function. You are doing an excellent job. Keep going 💪🎉
@lepaullove26
@lepaullove26 3 ай бұрын
This was a good explanation with an example I never thought of. The only thing I think you missed was that two different hashed values can have the same hash as output[COLLISONS]. So a person could guess an incorrect password that just so happened to have a hash that is the same output as your correct password. The probability of that happening is extremely small, but definitely possible.
@xsv2970
@xsv2970 4 ай бұрын
Thanks for the explanation of a very basic authentication process....
@FabiVoltair
@FabiVoltair 4 ай бұрын
That’s beautifully explained ❤
@Xabraxus
@Xabraxus 4 ай бұрын
This is one of those pillow thoughts I get every now and again, it seems impossible but if you could encrypt data as a sort of hash and pull information out of a magic hat so to speak, I think it would be pretty dang cool. The only way I can think of accomplishing it would involve encrypting onto 'something' that exists irrespective of our universe, so not time space or matter or any of the fields we interact with. It would have to be something abstract like fate, or predetermination essentially unpacking what should be completely random information into exactly the encoded information.
@bwill325
@bwill325 4 ай бұрын
Great explanation. Good to be reminded of the details.
@nomore6167
@nomore6167 2 ай бұрын
The non-verbalized on-screen text, "assuming no collision", is the most important part. My initial reaction was "you were correct, right up until that last part" because I wasn't looking at the screen when I heard it, so I didn't see that non-verbalized note. I would say it's actually extremely helpful when people argue that they can reverse-engineer a hash because they immediately identify themselves as people whose "knowledge" and opinions can be completely disregarded because they are untethered from reality.
@harryzachariou1
@harryzachariou1 2 ай бұрын
Will really confuse people if you start to introduce salting to the hash 🤣
@sparkyy0007
@sparkyy0007 4 ай бұрын
Now that right there would be one serious compression algorithm... lol
@jamesmnguyen
@jamesmnguyen 4 ай бұрын
Hashes are a good way to check for small errors between two supposedly identical pieces of data. Most notably when you download something.
@ame7165
@ame7165 29 күн бұрын
what he explained in this video is a large part of how some core cryptocurrency functionality works. and tables with reverse lookups for hashes are called rainbow tables. they aren't practical for anything other than short or common strings or passwords, but they do exist
@MrBitviper
@MrBitviper 4 ай бұрын
well explained. you were absolutely spot on
@robertthomas5906
@robertthomas5906 4 ай бұрын
That's how you find out if someone knows anything about encryption theory. What's a hash? What's a digest? Who is Bob and Alice?
@neoncyber2001
@neoncyber2001 Ай бұрын
I think that the critiques were aimed at the fact that some older hashing algorithms are no longer considered cryptography secure. And some non cryptographic hashes can in some cases be used to find the original data.
@shbooo
@shbooo 4 ай бұрын
Also important to mention hash overlapping with legacy hashing algorithms that can result in the same hash from 2 separate data sources
@stargator4945
@stargator4945 3 күн бұрын
That is the sense of a rainbow table. which has a list of Billions of passwords with the hashes ordered by the hash. Most of the easy remembered passwords can be found in a very short time when you get access to the hash list of a server.
@KitGerrits
@KitGerrits 4 ай бұрын
There's 2 things to keep in mind: * 1. There are so-called Rainbow Tables that can give *some sort of input* that results in that hash (not necessarily the same but). * 2. If all you store of the password is a hash, the password need not be the same, it just needs to *result in the same hash* This is why any hashing algo that has a rainbow table is pretty unsafe to use as a password hashing algo. You can complicate this by requiring "hashes of hashes", which can make a rainbow table attack take longer, but it is still possible to "reverse", if you know the settings. TBH, I'm not well versed enough to know how salting complicaties this, but it seems to work, so I simply consider it "magic" ;-)
@natew4724
@natew4724 3 ай бұрын
👍🎉
@priusscientia
@priusscientia 4 ай бұрын
And that's why "salting" short strings before hashing is adding a little extra of security.
@Hornswroggle
@Hornswroggle 4 ай бұрын
I remember when an MMO I played some years ago had to make a database and security update. one of the consequences was that everyone had to change their passwords, because the new database allowed for higher minimum length passwords. In the announcement they also revealed that, while they don't have our plain passwords, they had found that about 35% of ALL account passwords were IDENTICAL, by comparing the hashes.
@gf1006
@gf1006 4 ай бұрын
A way to kind of reverse a hash is to keep a table with the hashes as the key and a list of inputs that give that hash as the value. That way you input the hash value and get a list of some of the possible values. However there are infinite values it could be but 99% of them will be in just a few
@MilMike
@MilMike 4 ай бұрын
You could use a hash db (rainbow table) to "restore" the hash. It works usually better with shorter strings, you won't be able to restore a full book as you said.
@smaug9833
@smaug9833 3 ай бұрын
Hashing is usually meant for comparing passwords and reveal data tampering or losses in transit. People confuse it with encryption.
@EdrickIvan
@EdrickIvan 4 ай бұрын
A lot of people say dehashing something is like unbaking a cake.
@cs-oi4im
@cs-oi4im 3 ай бұрын
I think an algorithm can be used that links an input of any length to a variable-length output so that we can get back the input through the output. That's what I have read and understood so far.
@civil_leuthie
@civil_leuthie 4 ай бұрын
The whole point of hashes to compare data without actually having to give up the data. Passwords, version checking, file validity, etc. If you could reverse them, then by giving the hash you'd be giving the data and that would subvert the entire point.
@siamesestormtrooper
@siamesestormtrooper Ай бұрын
Can’t believe armchair CS enthusiasts are trying to debunk someone with some of the most comprehensive and informational networking content on this platform
@StaticSkyTV
@StaticSkyTV 3 ай бұрын
When user accounts were mostly stored in LDAP, all passwords were hashed. So people made rainbow tables of commonly used passwords and their hashes.
@mksundstrom
@mksundstrom 4 ай бұрын
This is exactly how you can authenticate a digital file, to ensure it has not been altered. We used this method to create receipts for digitally signed documents at my previous job.
@uncrunch398
@uncrunch398 3 ай бұрын
Collisions (same hash shared by more than one value) are possible. Which is why stronger functions are pushed to default and standard when collisions become probable to happen within a given period. If you build a hash table of your files using the same CRC as used in data CD sector encoding you'll see a lot of collisions in your own set.
@therealromster
@therealromster 4 ай бұрын
Dictionary lookup, this is why it's a good idea to apply salt. A secret string that makes the hash unique so dictionary attacks wont work.
@shahzaibhassan2777
@shahzaibhassan2777 3 ай бұрын
He didint even say we are wrong, He just explained it. Truly good content 😅
@fn22739
@fn22739 2 ай бұрын
ok hashing finally makes sense to me. that's why people say you can check the integrity of a file by checking if it's hash has changed
@WilburJaywright
@WilburJaywright Ай бұрын
I feel like that guarantees that at least some hashes are the same for two completely different data.
@SetitesTechAdventures
@SetitesTechAdventures 4 ай бұрын
I agree. I think people use the word encrypt too often (often incorrectly) so they think hashing and encryption are the same thing. They are not.
@WesternCommie
@WesternCommie 4 ай бұрын
Thank you for explaining this.
@billyelliot4141
@billyelliot4141 4 ай бұрын
Finally met a guy who likes hash more than me. 😂 your not wrong dude. Men need to be endured or educated. Your a great teacher. 👍 marcus aurelias would be proud of u.
@joejitsuway960
@joejitsuway960 4 ай бұрын
This is probably the easiest way to explain hashing vs encryption as well.
@RoyalYoutube_PRO
@RoyalYoutube_PRO 3 ай бұрын
That was the best explanation ever
How secure is 256 bit security?
5:06
3Blue1Brown
Рет қаралды 3,2 МЛН
КАК ДУМАЕТЕ КТО ВЫЙГРАЕТ😂
00:29
МЯТНАЯ ФАНТА
Рет қаралды 10 МЛН
Looks realistic #tiktok
00:22
Анастасия Тарасова
Рет қаралды 106 МЛН
What if my Intel CPU explodes??
14:20
Paul's Hardware
Рет қаралды 5 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,2 МЛН
Path to Learning Front-End Web Development
3:22
SnipherDev
Рет қаралды 10
Hashing Algorithms and Security - Computerphile
8:12
Computerphile
Рет қаралды 1,5 МЛН
Hashing Explained
10:59
Mental Outlaw
Рет қаралды 10 М.
Password Storage Tier List: encryption, hashing, salting, bcrypt, and beyond
10:16
Study Music | ADHD Relief Music for Better Concentration | Background Music for Focus
Greenred Productions - Relaxing Music
Рет қаралды 161
This Week in Google 779
TWiT Tech Podcast Network
Рет қаралды 231
Passwords & hash functions (Simply Explained)
7:28
Simply Explained
Рет қаралды 367 М.
#samsung #retrophone #nostalgia #x100
0:14
mobijunk
Рет қаралды 12 МЛН
Как бесплатно замутить iphone 15 pro max
0:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 8 МЛН
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
VA-PC
Рет қаралды 2,5 МЛН
Как распознать поддельный iPhone
0:44
PEREKUPILO
Рет қаралды 2,3 МЛН
Look, this is the 97th generation of the phone?
0:13
Edcers
Рет қаралды 7 МЛН
low battery 🪫
0:10
dednahype
Рет қаралды 1,1 МЛН