Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Section 2 continues its focus on Cryptographic tools. For Part 3.3, you're introduced to the concept of "Integrity Checking" we do this by testing for "Modifications." Modifications occur in two ways, accidental/unintentional, and deliberate/intentional, so you'll explore how this is performed in penetration testing and what tools and practices you should employ when conducting this tests. You'll also learn how Accidental or unintentional hacks occur thru Hash transactions, Deliberate and intentional modifications are hacks that target or occur on MACs -- MAC, message authentication code, and DS – digital signature.