all InfoSec news
ReversingLabs Hashing Algorithm
ReversingLabs Blog blog.reversinglabs.com
Traditional hashing algorithms (e.g., MD5, SHA-1) provide an essential tool for security applications. Although commonly used for allowlisting and blocklisting, traditional hashes have significant drawbacks for detecting malware. First, a malicious file must be seen before a hash can be created so polymorphic attacks are not detectable. Second, hashes are fragile, enabling malware authors to make inconsequential changes to files to avoid detection.
algorithm algorithms allowlisting applications attacks authors blocklisting can file hash hashes hashing malicious malware md5 polymorphic products & technology reversinglabs security tool