A situation where two different inputs produce the same hash output. Hash collisions can be exploited to bypass integrity checks or forge digital signatures.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free