mirror of
https://github.com/billbuchanan/appliedcrypto.git
synced 2026-02-20 13:50:42 +00:00
Fix grammar and capitalization in README.md
Corrected minor grammatical errors and improved capitalization in the README.
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||

|
||||
|
||||
# Lab 3: Hashing
|
||||
Objective: The key objective of this lab is to understand the range of hashing methods used, analyse the strength of each of the methods, and in the usage of salting. Overall the most popular hashing methods are: MD5 (128-bit); SHA-1 (160-bit); SHA-256 (256-bit); SHA-3 (256-bit), bcrypt (192-bit) and PBKDF2 (256-bit). The methods of bcrypt, scrypt and PBKDF2 use a number of rounds, and which significantly reduce the hashing rate. This makes the hashing processes much slower, and thus makes the cracking of hashed passwords more difficult. We will also investigate the key hash cracking tools such as hashcat and John The Ripper.
|
||||
Objective: The key objective of this lab is to understand the range of hashing methods used, analyse the strength of each of the methods, and in the usage of salting. Overall, the most popular hashing methods are: MD5 (128-bit); SHA-1 (160-bit); SHA-256 (256-bit); SHA-3 (256-bit), bcrypt (192-bit) and PBKDF2 (256-bit). The methods of bcrypt, scrypt and PBKDF2 use a number of rounds, and which significantly reduce the hashing rate. This makes the hashing processes much slower, and thus makes the cracking of hashed passwords more difficult. We will also investigate the key hash cracking tools such as Hashcat and John the Ripper.
|
||||
|
||||
Open up your Ubuntu instance within vsoc.napier.ac.uk and conduct this lab.
|
||||
|
||||
@@ -10,7 +10,7 @@ Demo: [here](https://youtu.be/rnTLr6iUbf0)
|
||||
If required, you can check the hashing methods here: https://asecuritysite.com/encryption/js10
|
||||
|
||||
## A Hashing
|
||||
In this section we will look at some fundamental hashing methods.
|
||||
In this section, we will look at some fundamental hashing methods.
|
||||
|
||||
### A.1
|
||||
Using (either on your Windows desktop or on Ubuntu):
|
||||
@@ -68,7 +68,7 @@ SHA-384 hex chars:
|
||||
|
||||
SHA-512 hex chars:
|
||||
|
||||
How does the number of hex characters relate to the length of the hash signature?
|
||||
How does the number of hex characters relate to the length of the hash value?
|
||||
|
||||
|
||||
### A.4
|
||||
@@ -150,6 +150,12 @@ Also, if you want to remove the hashed password you have already cracked, you ca
|
||||
rm .hashcat\hashcat.potfile
|
||||
```
|
||||
|
||||
Otherwise, you can use the --show option to show previously cracked hashes:
|
||||
|
||||
```
|
||||
hashcat --show
|
||||
```
|
||||
|
||||
### B.2
|
||||
On Ubuntu, next create a word file (words) with the words of “napier”, “password” “Ankle123” and “inkwell”
|
||||
|
||||
|
||||
Reference in New Issue
Block a user