diff --git a/unit03_hashing/README.md b/unit03_hashing/README.md index a2c1e6f..01a4a70 100644 --- a/unit03_hashing/README.md +++ b/unit03_hashing/README.md @@ -18,16 +18,15 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV. ## Presentations * Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf) -* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ) +* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0) * Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs) - ## Lab * Unit 3 Lab (PDF): [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lab/new_lab03.pdf) * Unit 3 Lab (video): [here](https://www.youtube.com/watch?v=rnTLr6iUbf0) - + ## Tests diff --git a/unit03_hashing/lab/README.md b/unit03_hashing/lab/README.md index 3f0c9be..7b97ec7 100644 --- a/unit03_hashing/lab/README.md +++ b/unit03_hashing/lab/README.md @@ -761,10 +761,11 @@ For the following identify the hash methods used: ## K.2 It is known that a user has used a password of “passXord”, where X is an unknown character or number. Can crack the following hashes using Hashcat and a filter: -
+ +``` 5fa8051ada600a097bd0922d7a085b94734684c4e070b24a02cf43d24d6eedbe a6f63a5fb10b3bba180a79f2fc565b1db2101040ce71ea80692d671857fe2117 -+``` Passwords used: @@ -773,20 +774,22 @@ Number of tests: ## K.3 Download the bfield.hash password hash, and using the rockyou.txt list, determine the first 10 passwords in the hashed file. An example command might be: -
+ +``` hashcat -m 0 bfield.hash rockyou.txt -+ +``` First 10 passwords from bfield.hash: The download of the hashes and wordlist is likely to be zipped with 7-zip. Here's some commands you might use: -
+``` sudo apt-get install 7zip-full 7z e bfield.hash.7z 7z e rockyou.txt.bz2 -+``` ## L What I should have learnt from this lab? The key things learnt: @@ -817,3 +820,6 @@ npm install libname ## Possible solutions Have a look [here](https://github.com/billbuchanan/appliedcrypto/blob/main/unit03_hashing/lab/samples_ans.md) +# AWS Lab (Encrypting Data Buckets) +If you have time and interesting in coninuing to develop your Cloud skills, please complete the lab on encrypting data buckets [here](https://asecuritysite.com/aws/lab02). + diff --git a/unit03_hashing/lecture/README.md b/unit03_hashing/lecture/README.md index c3284e9..7f114b3 100644 --- a/unit03_hashing/lecture/README.md +++ b/unit03_hashing/lecture/README.md @@ -25,19 +25,23 @@ The key concepts are: MD2. MD4. MD5. SHA-1. Salting. Collisions. Murmur and FNV. ## Presentations -* Week 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/esecurity/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf) -* Week 3 Presentation (video) - Hashing: [here](https://youtu.be/3D11YGD4vFQ) - +* Unit 3 Presentation (PDF) - Hashing: [here](https://github.com/billbuchanan/appliedcrypto/blob/master/unit03_hashing/lecture/chapter03_hashing_authentication.pdf) +* Unit 3 Presentation (video) - Hashing: [here](https://youtu.be/RCArDEBXvW0) +* Unit 3 Presentation (Doodle) - Hashing: [here](https://youtu.be/F3xRatoArEs) + ## Videos The voice over lecture is here: -[](https://www.youtube.com/watch?v=3D11YGD4vFQ "") +[](https://www.youtube.com/watch?v=RCArDEBXvW0 "") - +* OpenSSL hashing methods: [here](https://asecuritysite.com/openssl/openssl_full2) +* Blake, MD5, SHA1, SHA256: [here](https://asecuritysite.com/hash/hashnew) +* Blake 3: [here](https://asecuritysite.com/hash/blake3) +* Benchmarks: [here](https://asecuritysite.com/hash/htest) +* sha512crypt ($6$) SHA512 (Unix): [here](https://asecuritysite.com/hash/splunk_hash)