20 - Cryptography
Module 20 - Cryptography
Creating Self-Signed Certificate with Inetmgr
Open inetmgr
Click machine name and select Server Certificates
From actions select Create Self signed Certificate
Choose Name and Personal. Go to a Site, choose Bindings from the Action panel
Select Add
Select Https, IP 10.10.10.16, hostname www.goodshopping.com, select the certificate
Go the site and right click refresh one time.
Hash identifier
Hash Identifier https://www.onlinehashcrack.com/hash-identification.php
Hash-identifier (CLI)
Hashid (CLI)
sha256sum
Find/Decrypt Hash Online
Hashes.com
CrackStation.net
CyberChef
Windows
Calculate Hash of text/File by HashCalc
Calculate MD5 Hashes using MD5 Calculator
Encode and Decode Text
Encode and Decode Text using BCTextEncoder
Encode/Decode Text (File Extension is .hex) using CrypTool
File โ New โ Enter Text โ Encrypt/Decrypt โ Symmetric (Modern) โ RC2 โ KEY 05 โ Encrypt
File โ Open โ Encrypt/Decrypt โ Symmetric (Modern) โ RC2 โ KEY 05 โ Decrypt
Linux
Decrypt Hash using Hashcat
Decrypt Hash using John the Ripper
First analyze hash type ->
john hashfile.hash
Then crack hash ->
john hashfile.hash --wordlist=/usr/share/wordlists/rockyou.txt --format=Raw-SHA1
Show the cracked password ->
john --show --format=Raw-SHA1 hashfile.hash
OR `john --show hashfile.hash
Perform Disk Encryption using VeraCrypt
Create Encrypted containers which can be mounted as Virtual Disks.
Creation
Click VeraCrypt
Create Volumn
Create an encrypted file container
Specify a path and file name
Set password
Select NAT
Move the mouse randomly for some seconds, and click Format
Exit
Mount Volume
Select a drive, select file, open, mount
Input password
Dismount
Exit
Integrity Checking of file
Hashing is used for integrity checking. You can check if some file has been modified by comparing the hash values
Windows
Get-FileHash is the built-in PowerShell cmdlet that can be used to generate a hash value, allowing you to verify against the reference hash.
WinMD5Free: A simple and free utility that allows you to calculate and compare MD5 checksums in Windows. You can drag and drop files into the program to generate and compare checksums.
FCIV (Microsoft File Checksum Integrity Verifier): A command-line utility provided by Microsoft that allows you to compute and verify hash values for files. You can use it to create checksums and compare them.
HashMyFiles: A free utility from NirSoft that provides a graphical user interface for calculating and comparing file hashes. It allows you to compare the hashes of multiple files at once.
File Checksum Tool: A user-friendly tool that can calculate and compare checksums for various hash algorithms like MD5, SHA-1, and SHA-256. It provides an easy way to verify file integrity.
Linux
sha256sum (or md5sum, sha1sum): These are built-in Linux commands for calculating the hash (SHA-256, MD5, SHA-1) of a file. You can use them in the terminal to calculate and compare checksums.
GtkHash: A graphical tool for Linux that supports various hash algorithms and provides a user-friendly interface for calculating and comparing file hashes. It integrates well with the Linux desktop environment.
RapidCRC: While primarily designed for Windows, there is a Linux version available. It's a user-friendly tool that supports a variety of checksum algorithms and is particularly useful for comparing and verifying large sets of files.
Hashdeep: A command-line tool for hashing files in Linux and Windows. It can create hash sets for multiple files and directories, and it's useful for verifying file integrity.
Last updated