A.MD65 B.SHA-135 C.XR12 D.MD5
A.Ciphertext B.Salt C.Cryptotext D.Rainbow table
A.Stack vulnerabilities B.Heap overflows C.Software overflows D.Buffer overflows