CAPEC 55 Rainbow Table Password Cracking

Draft Detailed Medium Risk
Severity Medium

Description

An attacker gets access to the database table where hashes of passwords are stored. They then use a rainbow table of pre-computed hash chains to attempt to look up the original password. Once the original password corresponding to the hash is obtained, the attacker uses the original password to gain access to the system.

Attack Execution Flow

3

Mitigations

1

Consequences

Indicators

1

Relationships

Related ATT&CK Techniques

1

Resources Required

1