Pattern: Use of broken hash algorith
Issue: -
Avoid using the broken algorithms MD5 or SHA-1.
Replace broken algorithms with secure alternatives. MD5 and SHA-1 should be replaced with SHA256, SHA384, SHA512, or other safer algorithms when possible, with MD5 and SHA-1 only being utilized by necessity for backwards compatibility.
Example of incorrect code:
Get-FileHash foo.txt -Algorithm MD5
Example of correct code:
Get-FileHash foo.txt -Algorithm SHA256
Example of incorrect code:
Get-FileHash foo.txt -Algorithm SHA1
Example of correct code:
Get-FileHash foo.txt