Greetings.
I have been researching the use of rainbow tables among "black hat" hackers and I was wondering how these look-up tables work. I've done a lot of googling and wiki-ing, but I am still having a hard time grasping the algorithm.
From my understanding, it basically:
-takes a password hash
-reduces the hash to plaintext
-if plaintext isn't found, it hashes the plaintext and loops?
Someone please correct this.
Also, what is the protocol behind reading the data in a rainbow table? Is there some open documentation on how the data is stored?
Any help is appreciated, thank you!
Bookmarks