Book of Eopi
  • 😍About the Author
  • 🤖ChatGPT for Cybersecurity
  • 📘CERTIFICATIONS
    • Certified Ethical Hacker (C|EH)(Practical)
      • Reconnaissance (Footprinting)
      • Scanning Networks
      • Vulnerability Analysis
      • System Hacking
      • Sniffing
      • SQL Injection
      • Remote code execution
      • Hacking Web Applications & Servers
        • Local and remote file inclusion
        • File upload bypass
        • Cross-site scripting
        • Cross-site request forgery
        • Server-side request forgery
      • Exploitation
        • Working with exploits
        • Password cracking
        • Metasploit
        • Buffer overflow
      • Cloud Computing
      • Cryptography
      • Mobile Pentesting Resources
      • Learning resources
  • 🏁My Hacking Materials
    • My Most Frequently Used Hacking Commands
    • RickdiculouslyEasy: 1 VulnHub WriteUp
    • Corrosion: 2 VulnHub WriteUp
    • Hackable: 3 VulnHub WriteUp
    • Empire: LupinOne Vulnhub WriteUp
  • 🐧101 Labs for Linux
    • 💻Hardware and System Configuration
      • LAB 1 - Boot Sequence
  • 🔧Mod Nintendo Switch Game
    • 🔹Pokémon Brilliant Diamond and Shining Pearl
      • 🟥Install mods on Nintendo Switch
      • 🟦Install mods on Yuzu/Ryujinx Emulator
      • 🔠Custom font for Pokémon BDSP
  • 📖SHARE TÀI LIỆU NVSP
    • 1️⃣HỌC PHẦN 1
    • 2️⃣HỌC PHẦN 2
    • 3️⃣HỌC PHẦN 3
    • 4️⃣HỌC PHẦN 4
    • 5️⃣HỌC PHẦN 5 (chưa hoàn thiện)
    • 6️⃣HỌC PHẦN 6
  • ⚔️Tổng Hợp Võ Lâm 2
    • 💰Server JX2 2014 - Bản Kinh Doanh
    • 👑Server JX2 2014 - Phiên bản Offline
    • 👑Server JX2 2017 - Phiên Bản Offline
    • 👑Server JX2 2021 - Phiên Bản Offline
Powered by GitBook
On this page
  • Introduction
  • Tools
  • Calculate One-way Hashes using HashClac
  • Calculate MD5 Hashes using MD5 Calculator
  • Calculate MD5 hashes for files using HashMyFiles
  • Perform File and Text Message Encryption using CryptoForge
  • Perform File Encryption using Advanced Encryption Package
  • Encrypt and Decrypt messages using BCText Encoder
  • Perform Disk Encryption Using VeraCrypt
  • Bitlocker
  • Rohos Disk Encryption
  • Cryptool
  1. CERTIFICATIONS
  2. Certified Ethical Hacker (C|EH)(Practical)

Cryptography

Welcome to the Cryptography module. This note will guide you thru all the methodologies that I used while preparing for the CEH (Practical) exam.

PreviousCloud ComputingNextMobile Pentesting Resources

Last updated 2 years ago

Introduction

Cryptography is the science of protecting information by transforming it into a secure format. This process, called encryption, has been used for centuries to prevent handwritten messages from being read by unintended recipients. Today, cryptography is used to protect digital data. It is a division of computer science that focuses on transforming data into formats that cannot be recognized by unauthorized users.

An example of basic cryptography is an encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed.

Tools

Calculate One-way Hashes using HashClac

  • You may use this tool to calculate the MD5 hashes

Calculate MD5 Hashes using MD5 Calculator

  • Use this tool to compare the hashes with other hashes

Calculate MD5 hashes for files using HashMyFiles

HashMyFiles is a small utility that allows you to calculate the MD5 and SHA1 hashes of one or more files in your system.

Perform File and Text Message Encryption using CryptoForge

Perform File Encryption using Advanced Encryption Package

Encrypt and Decrypt messages using BCText Encoder

Perform Disk Encryption Using VeraCrypt

VeraCrypt is an open-source utility for on-the-fly encryption. The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project

  • Creating an encrypted VeraCrypt volume File

    • Open the application and click “Create Volume”.

    • tap on “Create an Encrypted File Container”.

    • Select a path where the volume has to be saved.

    • Now, mention the volume size.

    • Set a password for the encrypted volume file.

    • For file system format we can set as “FAT“ and cluster as “Default”.

  • Mounting the Encrypted file into a Volume

    • Select any volume of your choice.

    • Select the VeraCrypt volume created before to be added.

    • Select Mount and it may prompt for a password.

  • Uploading Files into VeraCrypt Virtual Encrypted Volume

    • Create/Copy/Move the files into the Volume which you choose for mounting.

    • Paste all your confidential files inside that virtual volume.

    • Once completed, open the VeraCrypt application and then press “Dismount”.

Bitlocker

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers.

BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline.

Rohos Disk Encryption

Cryptool

CrypTool is an open-source project that is a free e-learning software for illustrating cryptographic and cryptanalytic concepts. According to "Hakin9", CrypTool is worldwide the most widespread e-learning software in the field of cryptology. CrypTool implements more than 400 algorithms.

I strongly recommend you learn all these tools. At least Go through the tools.

For example, the translation grid below could be used to decode "aHR0cHM6Ly9sb2xpdGVhbS5uZXQv" as "".

📘
https://loliteam.net/
SlavaSoft HashCalc - Hash, CRC, and HMAC Calculator
MD5 Calculator
HashMyFiles: Calculate MD5/SHA1/CRC32 hash of filesNirSoft
Logo
Encryption Software | Data Encryption Software
Logo
File Encryption Software
Encrypt Text with BCTextEncoder | Jetico
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
Logo
BitLocker (Windows 10) - Windows securitydocsmsft
Official Link of Microsoft
Logo
Rohos Disk EncryptionRohos
CrypTool PortalCrypTool Portal
Logo
Logo
Logo