mirror of
https://github.com/billbuchanan/appliedcrypto.git
synced 2026-02-21 11:18:02 +00:00
Merge branch 'main' of https://github.com/billbuchanan/appliedcrypto
This commit is contained in:
@@ -18,16 +18,15 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV.
|
||||
## Presentations
|
||||
|
||||
* Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
|
||||
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ)
|
||||
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0)
|
||||
* Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs)
|
||||
|
||||
<!-- * Unit 3 Presentation (live lecture) - See Teams [here](https://teams.microsoft.com/l/team/19%3ae4651d3846ed4a02ab6284eba8a37836%40thread.tacv2/conversations?groupId=d5c028ee-0450-4370-a9c5-48014fce2ca6&tenantId=99e0dc58-9c4b-4820-8617-04c386c254c6) for morning and evening lecture. -->
|
||||
|
||||
## Lab
|
||||
|
||||
* Unit 3 Lab (PDF): [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lab/new_lab03.pdf)
|
||||
* Unit 3 Lab (video): [here](https://www.youtube.com/watch?v=rnTLr6iUbf0)
|
||||
<!-- * Unit 3 Lab Part 2 (video): [here](https://www.youtube.com/watch?v=FKO6Pjsbp3g) -->
|
||||
|
||||
|
||||
## Tests
|
||||
|
||||
|
||||
@@ -761,10 +761,11 @@ For the following identify the hash methods used:
|
||||
|
||||
## K.2
|
||||
It is known that a user has used a password of “passXord”, where X is an unknown character or number. Can crack the following hashes using Hashcat and a filter:
|
||||
<pre>
|
||||
|
||||
```
|
||||
5fa8051ada600a097bd0922d7a085b94734684c4e070b24a02cf43d24d6eedbe
|
||||
a6f63a5fb10b3bba180a79f2fc565b1db2101040ce71ea80692d671857fe2117
|
||||
</pre>
|
||||
```
|
||||
|
||||
Passwords used:
|
||||
|
||||
@@ -773,20 +774,22 @@ Number of tests:
|
||||
|
||||
## K.3
|
||||
Download the bfield.hash password hash, and using the rockyou.txt list, determine the first 10 passwords in the hashed file. An example command might be:
|
||||
<pre>
|
||||
|
||||
```
|
||||
hashcat -m 0 bfield.hash rockyou.txt
|
||||
</pre>
|
||||
|
||||
```
|
||||
|
||||
First 10 passwords from bfield.hash:
|
||||
|
||||
|
||||
|
||||
The download of the hashes and wordlist is likely to be zipped with 7-zip. Here's some commands you might use:
|
||||
<pre>
|
||||
```
|
||||
sudo apt-get install 7zip-full
|
||||
7z e bfield.hash.7z
|
||||
7z e rockyou.txt.bz2
|
||||
</pre>
|
||||
```
|
||||
|
||||
## L What I should have learnt from this lab?
|
||||
The key things learnt:
|
||||
@@ -817,3 +820,6 @@ npm install libname
|
||||
## Possible solutions
|
||||
Have a look [here](https://github.com/billbuchanan/appliedcrypto/blob/main/unit03_hashing/lab/samples_ans.md)
|
||||
|
||||
# AWS Lab (Encrypting Data Buckets)
|
||||
If you have time and interesting in coninuing to develop your Cloud skills, please complete the lab on encrypting data buckets [here](https://asecuritysite.com/aws/lab02).
|
||||
|
||||
|
||||
@@ -25,19 +25,23 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV.
|
||||
|
||||
## Presentations
|
||||
|
||||
* Week 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/esecurity/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
|
||||
* Week 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ)
|
||||
<!-- * Unit 3 Presentation (live lecture) - See Teams [here](https://teams.microsoft.com/l/team/19%3ae4651d3846ed4a02ab6284eba8a37836%40thread.tacv2/conversations?groupId=d5c028ee-0450-4370-a9c5-48014fce2ca6&tenantId=99e0dc58-9c4b-4820-8617-04c386c254c6) for morning and evening lecture. -->
|
||||
* Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
|
||||
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0)
|
||||
* Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs)
|
||||
|
||||
|
||||
## Videos
|
||||
The voice over lecture is here:
|
||||
|
||||
[](https://www.youtube.com/watch?v=3D11YGD4vFQ "")
|
||||
[](https://www.youtube.com/watch?v=RCArDEBXvW0 "")
|
||||
|
||||
<!--
|
||||
And the classroom lecture from 2020 is here:
|
||||
## Demos
|
||||
Here are a few demos:
|
||||
|
||||
[](https://www.youtube.com/watch?v=gh2CI5m2W6Y "")
|
||||
-->
|
||||
* OpenSSL hashing methods: [here](https://asecuritysite.com/openssl/openssl_full2)
|
||||
* Blake, MD5, SHA1, SHA256: [here](https://asecuritysite.com/hash/hashnew)
|
||||
* Blake 3: [here](https://asecuritysite.com/hash/blake3)
|
||||
* Benchmarks: [here](https://asecuritysite.com/hash/htest)
|
||||
* sha512crypt ($6$) SHA512 (Unix): [here](https://asecuritysite.com/hash/splunk_hash)
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user