Download this episode
MD5 hashing, due to the avalanche effect, is a really easy detective control to bypass. (Other algorithms exist, like ssdeep, that are a bit harder but not widely used.) So, then, why don't many attackers bother modifying the file?
Available formats for this video:
Actual format may change based on video formats available and browser capability.
Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.