CEH Study Guide | Cybrary
MD5; SHA-1; RSA; Answer: The correct answer is 3. Attacks using Hash Tables. Which of the below attacks uses a pre-calculated hash table, a structure that maps keys to values, to retrieve plain text passwords? Dictionary attack; Rainbow attack; Hybrid attack; Brute Force attack; Answer: The correct answer is 2.
more