This commit is contained in:
billbuchanan
2023-02-10 07:23:21 +00:00
3 changed files with 26 additions and 17 deletions

View File

@@ -18,16 +18,15 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV.
## Presentations
* Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ)
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0)
* Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs)
<!-- * Unit 3 Presentation (live lecture) - See Teams [here](https://teams.microsoft.com/l/team/19%3ae4651d3846ed4a02ab6284eba8a37836%40thread.tacv2/conversations?groupId=d5c028ee-0450-4370-a9c5-48014fce2ca6&tenantId=99e0dc58-9c4b-4820-8617-04c386c254c6) for morning and evening lecture. -->
## Lab
* Unit 3 Lab (PDF): [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lab/new_lab03.pdf)
* Unit 3 Lab (video): [here](https://www.youtube.com/watch?v=rnTLr6iUbf0)
<!-- * Unit 3 Lab Part 2 (video): [here](https://www.youtube.com/watch?v=FKO6Pjsbp3g) -->
## Tests

View File

@@ -761,10 +761,11 @@ For the following identify the hash methods used:
## K.2
It is known that a user has used a password of “passXord”, where X is an unknown character or number. Can crack the following hashes using Hashcat and a filter:
<pre>
```
5fa8051ada600a097bd0922d7a085b94734684c4e070b24a02cf43d24d6eedbe
a6f63a5fb10b3bba180a79f2fc565b1db2101040ce71ea80692d671857fe2117
</pre>
```
Passwords used:
@@ -773,20 +774,22 @@ Number of tests:
## K.3
Download the bfield.hash password hash, and using the rockyou.txt list, determine the first 10 passwords in the hashed file. An example command might be:
<pre>
```
hashcat -m 0 bfield.hash rockyou.txt
</pre>
```
First 10 passwords from bfield.hash:
The download of the hashes and wordlist is likely to be zipped with 7-zip. Here's some commands you might use:
<pre>
```
sudo apt-get install 7zip-full
7z e bfield.hash.7z
7z e rockyou.txt.bz2
</pre>
```
## L What I should have learnt from this lab?
The key things learnt:
@@ -817,3 +820,6 @@ npm install libname
## Possible solutions
Have a look [here](https://github.com/billbuchanan/appliedcrypto/blob/main/unit03_hashing/lab/samples_ans.md)
# AWS Lab (Encrypting Data Buckets)
If you have time and interesting in coninuing to develop your Cloud skills, please complete the lab on encrypting data buckets [here](https://asecuritysite.com/aws/lab02).

View File

@@ -25,19 +25,23 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV.
## Presentations
* Week 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/esecurity/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
* Week 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ)
<!-- * Unit 3 Presentation (live lecture) - See Teams [here](https://teams.microsoft.com/l/team/19%3ae4651d3846ed4a02ab6284eba8a37836%40thread.tacv2/conversations?groupId=d5c028ee-0450-4370-a9c5-48014fce2ca6&tenantId=99e0dc58-9c4b-4820-8617-04c386c254c6) for morning and evening lecture. -->
* Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf)
* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0)
* Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs)
## Videos
The voice over lecture is here:
[![](http://img.youtube.com/vi/3D11YGD4vFQ/0.jpg)](https://www.youtube.com/watch?v=3D11YGD4vFQ "")
[![](http://img.youtube.com/vi/RCArDEBXvW0/0.jpg)](https://www.youtube.com/watch?v=RCArDEBXvW0 "")
<!--
And the classroom lecture from 2020 is here:
## Demos
Here are a few demos:
[![](http://img.youtube.com/vi/gh2CI5m2W6Y/0.jpg)](https://www.youtube.com/watch?v=gh2CI5m2W6Y "")
-->
* OpenSSL hashing methods: [here](https://asecuritysite.com/openssl/openssl_full2)
* Blake, MD5, SHA1, SHA256: [here](https://asecuritysite.com/hash/hashnew)
* Blake 3: [here](https://asecuritysite.com/hash/blake3)
* Benchmarks: [here](https://asecuritysite.com/hash/htest)
* sha512crypt ($6$) SHA512 (Unix): [here](https://asecuritysite.com/hash/splunk_hash)