Hash Calc Lab

The Hash Calc lab teaches you what “use” information is gained from using Hash Calculators to analyze files within a directory,  or specifically targeted files.  For example, the output of the Hash Calc tool includes the message digest about the target as well as all its relevant integrity algorithms. The lab also discloses several integrity algorithms not output from the Hash Calc tool that provide a wider range of output datasets. [toggle_content title="Transcript"] Hey, Leo Dregier here. In this video, I want to talk about hashing files, or basically a hashing calculator. This is a great tool to use to understand the principles of integrity, because it basically takes a file, analyzes it and gives you an output. And it shows you the message digest, and just about all of the possible integrity algorithms that exist. And when people are new to the subject of integrity, they basically have to learn things like MD5 and SHA. But there are many hashing programs that are beyond popular, like Ripe, Tiger, Whirlpool, which actually this tool doesn't do, Adler cyclic redundancy check, all the variants of SHA. So basically, we're going to take a file, text or string, in this case we're going to take a file, and you can take any file what you want, so I'm just going to pick any file on the system, just to show that it works. Select a bunch of these, if you want the appropriate message digest for it, and then calculate. And there, therefore you've got all of them message digests. Now that was relatively easy to use, if I do say so myself. And, keep in mind that if you have a file and you hash it, and later on you hash it, and the message digest calculates the same, then the file has not been changed, modified, altered, nothing has been added or subtracted or removed from that file. It also does not look at things like time stamps in attributes and things like that. It is purely the contents or the core data of the file that gets checked. So that's it. Hash My-- Calculator, easy program to use in the subject of cryptography. And you should definitely use this to get a better understanding of the principles that are in play. For example, confidentiality versus integrity - In my experience, most people goof up the principles of confidentiality and integrity, especially when preparing for any sort of testing exam. So use these tools, and understand how they work. All these tools do is take some data, for example a file, or a text string, or an hex string, and then analyze it to make sure nothing is changed, modified or altered. And you can prove that if the message digest computed as exactly the same. So thank you for watching. My name's Leo Dregier, and I'll catch you in the next video. [/toggle_content]
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?