🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 14 - 03 - Discuss Various Hash Functions and Cryptography Tools - 03_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Cryptography Exam 212-82 Hash Calculators for IMiobile Hash Droid Hash Tools Hash Checker https://play.google.com # hash tools Hash Droid WA RSO File path emulated/0/Download/open_gapps_log txt i (MDS) e waeame SO e Hashr - Hash& Checksum Calculator https://play.go...

Certified Cybersecurity Technician Cryptography Exam 212-82 Hash Calculators for IMiobile Hash Droid Hash Tools Hash Checker https://play.google.com # hash tools Hash Droid WA RSO File path emulated/0/Download/open_gapps_log txt i (MDS) e waeame SO e Hashr - Hash& Checksum Calculator https://play.google.com HASHOROID APK MDS [ Result in upper case e Hash Calc https://play.google.com 115e40550ad3etadbelct? R aRece Hash Generator - Checksum Calculator https://play.google.com Hash Smart Checker https://play.google.com https://play.google.com @ httpsy//play.google.com Copyright © by Y Pyrig {. All Rights Reserved. Reproduction Is Strictly ¥ Prohibited. L P Hash Calculators for Mobile Some hash calculators for mobile devices are discussed below. Hash Tools Source: https://play.google.com Hash Tools is a utility for calculating a hash from a given text or decrypting a hash to its original text. In this application, the available hash functions are MD5, SHA-1, SHA-256, SHA-384, and SHA-512. # hash tools (¢ B CHOOSE FILE v emulated/0/Download/open_gapps_log.txt MDS v Figure 14.16: Screenshot of Hash Tools Module 14 Page 1682 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Cryptography = Hash Droid Source: https://play.google.com The Hash Droid utility helps to calculate a hash from a given text or a file stored on the device. In this application, the available hash functions are Adler-32, CRC-32, Haval-128, MD2, MD4, MDS5, RIPEMD-128, RIPEMD-160, SHA-1, SHA-256, SHA-384, SHA-512, Tiger, and Whirlpool. o =..195%016:58 Hash Droid HASH A COMPARE TEXT HASHAFILE HASHES Select a hash function: MDS v HASHDROID.APK [T] Result in upper case CALCULATE Name: HashDroid.apk Size: 1,46 MiB MDS checksum 55dc3e8421935ed4e550ad3ebadbeBcf2 COPY CHECKSUM TO CLIPBOARD Figure 14.17: Screenshot of Hash Droid Some additional MDS5 hash calculators are as follows: = Hash Checker (https://play.google.com) = Hashr - Hash & Checksum Calculator (https://play.google.com) = Hash Calc (https://play.google.com) = Hash Generator - Checksum Calculator (https://play.google.com) = Hash Smart Checker (https://play.google.com) Module 14 Page 1683 Certified Cybersecurity Technician Copyright © by EG-Bouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Cryptography Exam 212-82 Cryptography Tools BCTextEncoder AxCrypt Q Encrypts confidential text in your message O Uses strong symmetric and public-key algorithms for data encryption https://axcrypt.net T BCTestEncoder Utility v, 1.03.2.1 Ele Edit DG Key Qptions Help AO0Tad Decoded plan text: 7948 - [=] ® X & & ? Encodeby: | possword v Ecode | [ BCTextEncoder uthty softmare smoifies ervodng and decodng text data, Plain text data are compressed, enarypted and converted to text format, which can then be easly copied to the dpboard or saved as a text fle. Protect from hackers and malcous software Microsoft Cryptography Tools https://docs.microsoft.com CDncealer e nvable to the Internet and untrusted netwerks https://www.belightsoft.com Morvtor appheations accessng network | Seauity poloes to meet your neecs Encoded text: 1.2 00 e ® Decode “BLGIN LNCOOLD MESSAGL - Version: 8CTextEncoder Uthity. 1.03.2.1 wyECQMESO X Icod) 25 20 TH0Y LGk FSGHM Qe A WEUF Lern Chie 2ehizt 04B3ASNDE0GWL 05 EKLANDE0B 241 376G SN 3 yOMNYENz 4 +822G2v ffl 2 QCOYEbIMOATIATIVREEVINCQORALD 7SR JGRPLICHEOM Y X LK 7H 4 0 4A 2110QRIDEHHImHinhmuZiom 2xbg 3 ITNQLOCHYTePFwaGlvaBe UZMOTeck+81) A 3QSAMSIQ0L VU Sy KEXCyxOGDAMNX TOQuSVMI KRDYUDIK ADLEG F8MCIEF OCHOARKIPIATP 297X VOV ZVXWROCUE DD fx IvF SyVDCARDMOY LYTIIYD 4w 4tn Z5ATYPEFUnEO 44 ICEZPS SN BWPDVMOST e 4L 2 BV AOHSAQZIHIr gy y ACOPRXIINO ¥QEFKINEON0 + (S HbSIUIITmQ = https.//www jetico.com Copyright © by EC- CryptoForge https://www.cryptoforge.com Cyphertop https://cyphertop.com L. All Rights Reserved. ReproductionIs Strictly Prohibited. Cryptography Tools You can use various cryptographic tools for encrypting and decrypting your information, files, etc. These tools implement different types of encryption algorithms. = BCTextEncoder Source: https://www.jetico.com The BCTextEncoder utility simplifies the encoding and decoding of text data. It compresses, encrypts, and converts plaintext data into text format, which the user can then copy to the clipboard or save as a text file. It uses public key encryption methods as well as password-based encryption. Furthermore, it uses strong and approved symmetric and public-key algorithms for data encryption. Module 14 Page 1684 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Cryptography z Exam 212-82 BCTextEncoder Utility v. 1.03.2.1 Eile Edit Key Options - O X Help BEEO0Td® Decoded plain text: 7948 &7 Encode by: password v| [TEncode] BCTextEncoder utility software simplifies encoding and decoding text data. Plain text data are compressed, encrypted and converted to text format, which can then be easily copied to the dipboard or saved as a text file. Protect from hackers and malicious software Be invisibleto the Internet and untrusted networks Monitor applications accessing network Security policies to meet your needs Encoded text: 1.2KB. Decode -----BEGIN ENCODED MESSAGE----- Version: BCTextEncoder Utility v. 1.03.2.1 wy4ECQMCSOZXsh3Ncodg2S 2R;j 76KYjuGkufSGNMK 2s WEUFTirHFhChXe2eh9zL 0sB9ASsnDBOBwb0s9s8Ku4mD60B2HN 37GP 55Kd4ZF 3lyOVNYEkz ++azZG2v kfLz qCpygbf3M20Ami47iNwReeV\WCqORdLD 75hR /cRPLSgkeoPiSPrX InWK7N +adM4A 2110QfUOd 3fjmHinhmuZjgm2xbg3 Pk 1TTNQLoChnYTePFwzQhwBe JUZMOTedk +8U 7pd3Q5AHsIQoI4VUx SmivKsXCyxOGIDaMnx70QwSVMz/KRpyUpaK +DL6G 7sMCI6F OChoAxKIPj43P 2grxfVOVZvXWqoCuESSfx 1vF SvvbCARpMga 1fYTkJYp +mhix-+.n 254YYFEFLkwMdO +k +YIC8ZPS SDn8WPDVMOjTccqz4GL2L /BuV 19H5AQZtHSrqKyy kCB9jeX8kZNO 3rQ8FKkWeOtii0 +fSdFr 3ybSBUISTmQ= =qUzR -----END ENCODED MESSAGE ----- Figure 14.18: Screenshot of BCTextEncoder Some additional cryptography tools are as follows: = AxCrypt (https://axcrypt.net) * Microsoft Cryptography Tools (https://docs.microsoft.com) = Concealer (https.//www.belightsoft.com) = CryptoForge (https://www.cryptoforge.com) = Cyphertop (https://cyphertop.com) Module 14 Page 1685 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser