Professional Documents
Culture Documents
CEH11 - Module 20 Cryptography
CEH11 - Module 20 Cryptography
") sign will tell you that the values are different.
Module 20 Page 2016 Ethical Macking and Countermeasures Copyright © by E-Soumell
"Al RightsReserved, Reproducton fs Stcty Prose.Ehleal Hacking and Countermeasures vam 212.50 Certified Ethieal Hacker
‘eyptography
@ MDS Calculator - x
File Tools Help
Fle Name
[eWWenVeomnDeatep ndeaeOOOme dd
(MDS Digest Compare To
943408 108edecab0518677 17ocS8dbd
D Upper case
Figure 20:30: Screenshot of MDS Caleulator
+ HashMyFiles
Source: https://www.nirsoft.net
HashMyfiles is a utility that allows you to calculate the MDS and SHA1 hashes of one or
more files in the system. It allows you to copy the MDS/SHA1 hash list to the clipboard or
save it in a text/html/xml file. You can launch HashMyFiles from the context menu of
Windows Explorer and display the MDS/SHA1 hashes of the selected files or folders.
EB) Hashwyfites - o x
Fie Edt View Options Help
Soane|Haarva
Fienome sHat
2076-613-1.Mpat ea1rtasosestecsaseebsDOTFMOSC0e99
190827 -ebcowame-n ‘MaeaTaSaSEtetaeG0eBEStecl4279 18
i fturentrnet-1-00.. 220 a68535445308855008cT THAT.
5 HorsLayoutpng 3eSbS7B LADO LEHADbADSAa aT 2ace..
vor. o1,2_206 5. SecHG2038SbbcIO2bTEdHOcABUcAA.
|S imgpsh, mobile seve}. To. UbdSA21273RebiGe 4 Ta20429433553 10 56066..
| predate demo 303 Saif Setbe25SeHOFocontad7Bades
5 raprov trpetep 049053506120306e7IHSDST3923eduotOoc
Siwrzies 15550 eB50564kSbetSt bea. J
‘oftes)
Figure 20.11: Screenshot of Hashes
Module 20 Page 3007 Ethical Hacking and Countermeasures Copy © by EE Commel
"Al RightsReserved, Reproducton fs Stcty Prose.Etheat Hocking and Countermeasures ‘1am 21250 Cotes Encl Hacer
‘cryptography
Some additional MDS and MD6 hash calculators are as follows:
"= MD6 Hash Generator (https://www.browserling.com)
* All Hash Generator (https://www.browserling.com)
+ MD6 Hash Generator (hitps://convert-tool.com)
"mds hash calculator (https://onlinehashtools.com)
* HashCale (https://www.slavasoft.com)
Morte 20 Page 2038 Ethical Macking and Countermeasures Copyright © by E-Soumell
"Al RightsReserved, Reproducton fs Stcty Prose.Ehleal Hacking and Countermeasures vam 212.50 Certified Ethieal Hacker
‘eyptography
Hash Calculators for Mobile
ae
ane = =
Ea ror
: a
a eo
= —— Bb =.
Hash Calculators for Mobile
Some hash calculators for mobile devices are discussed below.
"Hash Tools
Source: https://play.google.com
Hash Tools is a utility for calculating a hash from a given text or decrypting a hash to its
original text. In this application, the available hash functions are MD4, MDS, SHA-1, SHA-
256, SHA-384, SHA-512, and NTLM.
Figure 20.12: Sereenshat of Hash Tools
Module 20 Page 2019 Ethical Macking and Countermeasures Copyright © by E-Soumell
"Al RightsReserved, Reproducton fs Stcty Prose.Ehleal Hacking and Countermeasures vam 212.50 Certified Ethieal Hacker
‘eyptography
Hash Droid
Source: https://play.google.com
The Hash Droid utility helps to calculate a hash from a given text or a file stored on the
device. In this application, the available hash functions are Adler-32, CRC-32, Haval-128,
Mb2, MD4, MDS, RIPEMD-128, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512, Tiger,
and Whirlpool.
Diettiere
Figure 20.13: Screenshot of Hash Droid
Some additional MDS hash calculators are as follows
* MDS Checker (https://play.google.com)
"Hash Checker (https://play. google.com)
= Hashr - Checksum & Hash Digest Calculator (https://play.google.com)
* Hash Calculator (https://play.google.com)
"Hash Cale (https://play.google.com)
Module 20 Page 2050 Ethical Macking and Countermeasures Copyright © by E-Soumell
"Al RightsReserved, Reproducton fs Stcty Prose.Ehleal Hacking and Countermeasures vam 212.50 Certified Ethieal Hacker
‘eyptography
Cryptography Tools
| Encrpts confidential eet in your message
BeTestEncoder | Uses strong symmetric ans pubic hey seorthms
eauobatae?
&)|@
|
Advanced Encryption Package
2017
Cryptography Tools
You can use various cryptographic tools for encrypting and decrypting your information, files,
etc. These tools implement different types of encryption algorithms.
"= BCTextEncoder
Source: https://www.jetico.com
The CTextEncoder utility simplifies the encoding and decoding of text data. It
compresses, encrypts, and converts plaintext data into text format, which the user can
then copy to the clipboard or save as a text file. It uses public key encryption methods as
well as password-based encryption. Furthermore, it uses strong and approved symmetric
and public-key algorithms for data encryption,
Module 20 Page 3051 Ethical Hacking and Countermeasures Copyright © by E-Counel
"Al RightsReserved, Reproducton fs Stcty Prose.ciel
Hacking and Countermeasures
‘eyptography
ecTeséncoder Uy 1032.1
file Edit Key Options Help
@aaoagtrtae?
vam 212.50 Certified Ethieal Hacker
bec pin ct 748 a)
Cee
ECTentEncoder utity software senplfes encoding and decoding text data. lan text data are compressed,
encrypted and converted to text format, which can then be easly copie tothe cpboard er saved asa text fle.
Protect For hackers and maloous software
Be nse to tre Internet and untrusted networks
Monitor appleatons acessing network
Searity poles to meet your needs
Neon: SCTextEnceder Utity v, 1.3.2.1
ry SECQMCSODIchS4 coda S2RI7EKY LRU ASCNMK2eWELFICHPACHEZehOA
CeBSASsNDEOB bOsSs8kusmD SOB IN37GP SSAA yOWNYBa+ rax7G2VAfL2