Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Severity Level: Warning
Description
Avoid using the broken algorithms MD5 or SHA-1.
How
Replace broken algorithms with secure alternatives. MD5 and SHA-1 should be replaced with SHA256, SHA384, SHA512, or other safer algorithms when possible, with MD5 and SHA-1 only being utilized by necessity for backwards compatibility.
Example 1
Wrong
Get-FileHash foo.txt -Algorithm MD5
Correct
Get-FileHash foo.txt -Algorithm SHA256
Example 2
Wrong
Get-FileHash foo.txt -Algorithm SHA1
Correct
Get-FileHash foo.txt