all-in-one privacy solution":["O Proton Unlimited é uma solução única de privacidade"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sem anúncios. Privacidade por padrão."],"People before profits":["Pessoas acima do lucro"],"Security through transparency":["Segurança por meio da transparência"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["As melhores ofertas de ${ BLACK_FRIDAY } do Proton Mail"],"The world’s only community- supported email service":["O único serviço de e-mail do mundo apoiado pela comunidade"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft }, ${ minutesLeft }, e ${ secondsLeft } restantes"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crie vários endereços"],"Hide-my-email aliases":["Use aliases do hide-my-email"],"Quickly unsubscribe from newsletters":["Cancele a assinatura de newsletters rapidamente"],"Use your own domain name":["Use seu próprio nome de domínio"]},"specialoffer:logos":{"As featured in":["Destaques"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Obtenha um e-mail criptografado que proteja sua privacidade"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Oferta de Black Friday do Proton Mail - Até 40% de desconto"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenha até 40% de desconto nas assinaturas do Proton Mail nesta Black Friday. Confira ótimas ofertas em nossos planos de e-mail seguro com criptografia de ponta a ponta."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Oferta de Black Friday do Proton Mail - Até 40% de desconto no e-mail protegido"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Com o preço de ${ TOTAL_SUM } no primeiro ano"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"30-day money-back guarantee":["Garantia de reembolso de 30 dias"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"Billed at ${ TOTAL_SUM } for the first year":["Com o preço de ${ TOTAL_SUM } no primeiro ano"],"You save ${ SAVE_SUM }":["Economize ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["-${ DISCOUNT }"],"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Meu serviço favorito de e-mail"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Agradecemos ao Proton por nos manter a salvo no complicado universo da internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Você recebe pelo que paga. No caso das grandes tecnologias, você se acostuma quando não paga nada. Parei de usar o Gmail e troquei para o @ProtonMail"]},"specialoffer:time":{"Days":["Dias"],"Hours":["Horas"],"Min":["Min"]},"specialoffer:title":{"And much more":["E muito mais"],"Make your inbox yours":["Deixe a caixa de entrada do seu jeito"],"Safe from trackers":["A salvo de rastreadores"],"Stay organized":["Mantenha-se organizado"],"Black Friday email deals":["Ofertas de e-mail da Black Friday"],"Don’t just take our word for it":["Não confie apenas em nossa palavra"],"Our story":["Nossa história"],"Transfer your data from Google in one click":["Transfira seus dados do Google com um clique"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_VPN_SERVERS } servidores em mais de ${ TOTAL_VPN_COUNTRIES } países, conexão com até 10 dispositivos, acesso a serviços de streaming do mundo todo, um bloqueador de anúncios e malware e muito mais."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Compartilhe facilmente seus calendários com amigos, familiares ou colegas e visualize calendários externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 1 domínio de e-mail personalizado, 10 endereços de e-mail, 10 aliases do hide-my-email, compartilhamento de calendário e muito mais."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 3 domínios de e-mail personalizados, 15 endereços de e-mail, aliases ilimitados do hide-my-email, compartilhamento de calendário e muito mais."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gerencie até 25 calendários, apps para dispositivos móveis, protegidos com criptografia de ponta a ponta, importação de calendário com 1 clique do Google e muito mais."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["No momento estamos enfrentando problemas com o serviço Proton VPN"],"Learn more":["Saiba mais"]},"Status banner":{"Learn more":["Saiba mais"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["No momento, estamos com problemas no serviço ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["No momento, estamos com problemas em um ou mais serviços."]},"suggestions":{"Suggestions":["Sugestões"]},"Support":{"Sub category":["Subcategoria","Subcategorias"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoria","Categorias"],"Didn’t find what you were looking for?":["Não encontrou o que procura?"],"General contact":["Contato geral"],"Get help":["Obter ajuda"],"Legal contact":["Contato jurídico"],"Media contact":["Contato de mídia"],"Partnerships contact":["Contato de parcerias"],"Reading":["Leitura"]},"Support troubleshooting":{"App version":["Versão do aplicativo"],"Browser":["Navegador"],"Check if this helps":["Confira se isso ajuda"],"Choose a product":["Selecione um produto"],"Did this solve your issue?":["Isso resolveu seu problema?"],"Faster assistance is just a few clicks away":["Assistência mais rápida a apenas alguns cliques de distância"],"How can we help?":["Como podemos ajudar?"],"No, contact support":["Não, entrar em contato com o suporte"],"Please fill out one field after another":["Preencha os campos em sequência"],"Please make your selections":["Faça suas seleções"],"Proton account":["Conta Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Agradecemos pelo feedback"],"What can we help with?":["Com o que podemos ajudar?"],"Yes":["Sim"]},"support_modal_search_query":{"Search query":["Consulta de pesquisa"]},"support_search_button":{"Search":["Pesquisar"]},"support_search_i_am_looking_for":{"I'm looking for":["Estou procurando"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para uma resolução mais rápida, informe o problema no aplicativo Bridge: Ajuda > Comunicar um problema."],"Information":["Informações"]},"SupportForm:option":{"Account Security":["Segurança da conta"],"Contacts":["Contatos"],"Custom email domain":["Domínio de e-mail personalizado"],"Email delivery and Spam":["Entrega de e-mail e spam"],"Encryption":["Criptografia"],"Login and password":["Início de sessão e senha"],"Merge aliases and accounts":["Combinar alias e contas"],"Migrate to Proton":["Migrar para a Proton"],"Notifications":["Notificações"],"Other":["Outros"],"Plans and billing":["Planos e faturamento"],"Proton for Business":["Proton for Business"],"Sign up":["Criar conta"],"Storage":["Armazenamento"],"Users, addresses, and identities":["Usuários, endereços e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecione um tópico"]},"swiss_baseed_feature":{"Swiss based":["Sediado na Suíça"]},"Testimonial":{"Awards":["Prêmios"],"Customers":["Clientes"],"Featured":["Em destaque"],"Go to testimonial source":["Ir para a página inicial de depoimentos"],"Reviews":["Avaliações"],"Videos":["Vídeos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Se precisar de ajuda, confira nossa ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["É possível que a página que você está procurando tenha sido removida ou seja um\nlink antigo."]},"Title":{"On this page":["Nesta página"],"Related articles":["Artigos relacionados"],"Share ${ thisPage }":["Compartilhar ${ thisPage }"],"Thank you!":["Obrigado!"],"this page":["esta página"]},"Tooltip":{"More information":["Mais informações"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_VPN_SERVERS } servidores em mais de ${ TOTAL_VPN_COUNTRIES } países, a maior velocidade de VPN, ${ TOTAL_VPN_CONNECTIONS } conexões VPN, serviços de streaming do mundo todo, bloqueador de anúncios e malware e muito mais."]},"version_history_label":{"Version history":["Histórico de versões"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Armazene até ${ versionHistoryNumber } versões de cada arquivo por até ${ years } anos"]}}},"base":"blog","unleashApi":"https://account.proton.me/api","cdn":{"url":"https://pmecdn.protonweb.com/","enabled":"true"}};
window.frameworkContext = frameworkContext;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabled === 'true') {
return `${frameworkContext.cdn.url}${frameworkContext.base}/${filename}`;
} else {
return `/${frameworkContext.base}/${filename}`;
}
};
})();
What is a rainbow table attack and how to prevent it? | Proton
In this article, we explore how rainbow table attacks work and discuss ways to prevent them.
Rainbow table attack definition
A rainbow table attack is a cryptographic attack hackers use to break into systems by figuring out passwords from their hashes, which act as digital fingerprints. A hash function maps each password with a corresponding string of characters.
Unlike a brute-force attack(new window) that tries every possible password one by one, a rainbow table attack doesn’t require guesswork once the table is precomputed. This precomputed table (known as a rainbow table because of the way it looks if color-coded) is essentially a large database of hash value pairs linked to their plaintext counterparts.
How a rainbow table password attack works
1. Creating a list of passwords
When creating rainbow tables, hackers often target the most likely and commonly used passwords with simple patterns (for example, 123456, password, or qwerty), dictionary words, or password dumps obtained from data breaches.
2. Selecting the hash function and converting the passwords
Rainbow table attacks work well with simpler, faster cryptographic hash functions like MD-5, SHA-1, LM Hash, or NTLM Hash since they don’t use security features like salting (adding random data to each password before hashing) or key stretching (repeatedly hashing the password).
Password hashed with MD-5
Plaintext password
482c811da5d5b4bc6d497ffa98491e38
password123
Each plaintext password runs through the hash function to generate its corresponding hash, which has a unique, fixed-size string of characters as in the example above. Once all passwords are hashed, the hacker can use them to create the rainbow table.
3. Creating the rainbow table to reveal passwords
A rainbow table can be seen as a big Excel sheet, with hashed passwords in the first column and plaintext passwords in the second. If a breached hash is present in this table, that means the breached password is the cell next to it.
Rainbow table attack examples
Here are two hypothetical examples to illustrate how a rainbow table attack could play out:
A hacker identifies a social media site that uses an outdated hashing algorithm without any salting. By exploiting a SQL injection flaw, the attacker extracts the hash values of user passwords from the website’s database. Then they use a precomputed rainbow table to quickly convert thousands of these hashes back into plaintext passwords, compromising user accounts.
During routine network monitoring, a hacker discovers that an e-commerce website transmits password hashes insecurely between its servers and uses network sniffing tools to capture this data. Since they now have access to the password hashes, the hacker uses a rainbow table attack to decode customer passwords, gaining access to their shopping accounts and personal information.
Rainbow table attack data breaches
Rainbow table attacks have been used in the real world to steal millions of login details.
For example, a 2012 LinkedIn hack(new window) by Russian cybercriminals resulted in the theft of nearly 6.5 million user account passwords, causing a significant data breach. Following the initial discovery, LinkedIn found an additional 100 million compromised email addresses and passwords in 2016 related to the same incident. The stolen passwords were poorly protected, lacking additional security measures like salting, making them easier for attackers to decrypt using standard rainbow tables
How to prevent rainbow table attacks
Choose platforms with strong hash functions
Secure hash functions like bcrypt(new window) or Argon2(new window) use salting(new window) to add random data to your password before creating its hash. Without the salt, the password’s hash won’t show up in a rainbow table, so an attack would fail.
If you run your own websites or databases, keep your security settings updated by using plugins or modules that implement strong hashing algorithms.
Use complex passwords
Instead of using easy-to-guess passwords, opt for secure passwords(new window) made from at least 12 characters, which contain uppercase and lowercase letters, numbers, and symbols. Examples of strong passwords are ?GmmM1Z[c5:F or beht=ty]P:)Gf^c?p?+7. It’s unlikely for a cyberattacker to target such complex passwords using rainbow table attacks.
Turn on multi-factor authentication
Multi-factor authentication (MFA) like two-factor authentication (2FA)(new window) adds at least one more form of authentication to the password request, such as a code on your 2FA authenticator. If an attacker successfully discovers your password after a rainbow table attack, they won’t be able to pass the next steps of authentication.
Additionally, if you get an unexpected request for extra verification, it’s a clear sign that someone is trying to get into your account. You can quickly respond by changing your password.
Use alias email addresses
Alias email addresses(new window) can protect you from data breaches that could lead to rainbow table attacks since they are not connected to your primary email addresses. For example, you can keep using your main email for important messages and finances while reserving email aliases for less secure activities, such as signing up for untrusted services. If your alias email address is hacked, you can simply disable it.
Monitor the internet for data breaches
By staying informed about the latest breaches, you can determine if any of the services you use have been compromised and if your data has been leaked. This allows you to take proactive steps, such as changing your passwords immediately, to prevent hackers from using potentially exposed data to gain unauthorized access to your accounts.
All Proton Pass subscribers can use Pass Monitor(new window) to monitor the health of all passwords and Dark Web Monitoring(new window) to track various sources for data breaches. Our security model(new window) uses the secure bcrypt hashing algorithm, which salts your passwords before hashing them to stop rainbow table attacks. Furthermore, we run an advanced security program called Proton Sentinel(new window) to detect and prevent account takeover attacks.
Start securing your accounts from rainbow table attacks by signing up for a free Proton Pass account today.
Cyberattacks aren’t always executed through sophisticated methods like
man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on
something as simple as looking over your shoulder.
Shoulder surfing attacks are when someone watches you
Proton prioritizes our community’s privacy and data security in every aspect of
our business.
To further demonstrate our commitment, we underwent a rigorous external audit
and – on May 2, 2024 – received our ISO 27001 certification.
As an organiz
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo
backup capabilities. This feature is gradually rolling out to the Proton
community and will be available to everyone by the end of this week.
Smartphones have made us all am
From the very beginning, Proton has always been a different type of
organization. This was probably evident from the way in which we got started via
a public crowdfunding campaign that saw 10,000 people donate over $500,000 to
launch development. As
Your online data is valuable. While it might feel like you ’re browsing the web
for free, you’re actually paying marketing companies with your personal
information. Often, even when you pay for services, these companies still
collect and profit from y
Password spraying attacks pose a major risk to individuals and organizations as
a method to breach network security by trying commonly used passwords across
numerous accounts.
This article explores password spraying attacks, explaining their methods