Hash Verification

CYBRScore
Cyberscore

Hash verification ensures that a file has not been changed by comparing a file's hash value to a previously calculated value. If these values match, the file is presumed to be unmodified. In this lab, you will use AccessData's FTK suite of tools to identify and compare files and forensic images.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Hash verification ensures that a file has not been changed by comparing a file's hash value to a previously calculated value. If these values match, the file is presumed to be unmodified. In this lab, you will use AccessData's FTK suite of tools to identify and compare files and forensic images.