2.3 Summary of Windows Device Names
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:03
how you will commit to a curse
00:05
so long this morning, we have to find what emerging is how you can check the integrity of funny much fire. So if you don't watch that video, if you're free to post this one and go over it before in this lab, as he has some definition that you should know
00:19
in this lab, we're going to learn howto verified internally off a file by checking its M defy hush value using women. The five
00:27
on Indy five Harsh Jackson misses that. Yes, it's a 128 bits of Murray off the file Contact represented by Territo Axel Decimal Digits file with different MD five Soon's usefully are different.
00:41
So for this up, you'll need a Web browser in a window's environment. In this case, I have glue crumb in the Microsoft Windows
00:49
operating system, specifically Windows time.
00:53
You also need a compressor program.
00:55
Likely see it
00:58
So first you lied Tow open our browser on search for Women MD five. You can go there to build a website that delivered the real dot Will MD five that come
01:15
in the website. You can don't know the full by clicking will have defied freeware download.
01:26
Open it.
01:29
You should open the file names. We identified that exit.
01:34
So here, we're gonna do is we're gonna select a file.
01:40
Previously created
01:42
chick
01:44
the MD Five checks in value.
01:49
We have this
01:52
fire named Hello World that t X t.
01:57
And now what we should do is you're gonna have write down or copy this,
02:00
MD five texts in value.
02:04
We're gonna baste it.
02:06
We're here.
02:08
Save it for later.
02:10
So
02:12
we know we're gonna make a copy of the fire used with a different name.
02:21
This
02:22
put it.
02:23
Hello? Me?
02:28
No. We're gonna take that
02:30
in. Terry, off this file. You don't check the MD five value off this new file named Hello? Me?
02:39
You're gross.
02:42
And select this hello me file
02:46
as we see them defy checks in value
02:49
the intense. But we're gonna compete
02:53
the value invested
02:55
into the current.
03:00
No, we're gonna copy that.
03:02
Reviews value
03:07
ever gonna put it in this field
03:09
name? Georgina file, MD five checks in value,
03:15
and we're gonna click on verify
03:17
honey much.
03:21
So are you two hash? Fanatical. Yes. Off we seen
03:28
these two values are the same.
03:30
And why is that
03:32
generally two files got half the same end. If I harsh on Lee, if the contest are exactly the same
03:38
even a single bit off variation, we generate a completely different hush value. In this case, we don't modify the content, just the name
03:49
this tool can be used very fighting three or funny much file. Generally when we received money mash. We also receive its M defy hush. We must verify it issues tools like this one to check that the much hasn't been modified or damage, which is important as well for percent being the evidence on the most thrilling
04:09
its integrity in court.
04:11
In the next model, we're going to study how to generate on work with me much vice.
Up Next
Similar Content