Education Technology


Cybersecurity 5 - Turn the (Rainbow) Tables

Activity Overview

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used passwords, to decrypt the hashed password they’ve stolen.

About the Lesson

For more information on this series of activities and set-up required, check out the Computer Science Resources page.