Lab #7 Digital Forensics(1)

pdf

School

University of North Carolina, Charlotte *

*We aren’t endorsed by this school

Course

CIS675

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

8

Uploaded by MajorNeutronGerbil28

Report
OCR@UC Lab _____________________________________________ LESSON TITLE: SUMMARY: Working with Hashing, Digital Signatures and Passwords Level: Time Required: Beginner Advanced Intermediate Audience: Instructor-led Self-taught Lesson Learning Objective/Outcomes: Upon completion of this lesson, students will be able to: Upon completion of this lesson, students will have a basic understanding of how to encrypt and hash a file. Materials List: Computers with Internet connection Browsers: Firefox, Google Chrome, or Internet Explorer *Linux System Administration Lab requested through website Main Instruction: Time Required: 15 minutes At the start of this lab, have your students do the following: Test out if they have Internet and login in to their assigned virtual machine. Have your students go to this website on their respective computers: https://sandbox02.cech.uc.edu/vcac Select the Domain: vsphere.local Log in using the OCR@UC provided username and password In the Catalog, click Request on the virtual machine that says Linux System Administration Lab Go to Deployments, look for Linux System Administration Lab, and click on it. Click the gear icon next to the name and select Connect to Remote Console. Begin the lab. Digital Forensics (Hashing - Digital Signatures) 2 hours 30 minutes
Module Activity Description: Time Required: 15 minutes Part One: Hashing Files in Linux Let’s start by hashing some simple text data. In this exercise will we be using some of the more popular hashing algorithms; MD5, SHA1, and SHA256. Log into your Kali Linux system Open a command terminal and enter: echo “Network Security” | openssl md5 The output you receive is the MD5 hash value for the text “Network Security”. MD5 using a 128-bit hash value, which is being displayed in hexadecimal format. So regardless of the size of the text, the size of the hash will always be the same. Run the command again, but let’s add some text: echo “Network Security is my favorite class” | openssl md5 Notice the hash length stays the same, even with more data. Module Assessment Question 1 - Run the above command two more times, but use the hash algorithms sha1 and sha256 1. Take a screen shot of your results and paste them here 2. How many bits long are each of these hashes? Introduction Encryption and Hashing are often used interchangeably, but incorrectly so. They are similar in the fact they both use algorithms to create a scrambled mess of information, but there are two distinct differences. A hash is a number calculated from the data (not the data itself), where encryption scrambles up the all of the data. Also a hash value has a fixed length (depending on the algorithm used), where encrypted data size changes with the size of the plaintext input. In other words, encryption is used to hide the data, where hashing is used to identify or verify the data. They are often used in conjunction with one another.
Module Activity Description: Time Required: 45 minutes Log into your Windows 10 LAN system Browse to https://winscp.net/download/WinSCP-5.13.6-Setup.exe In the “ Downloads ” folder, you find the downloaded setup file for WinSCP . Let’s verify this file is intact before we install it. Most software companies will provide Checksums for their software when you download it. In your web browser, find the link that says Checksums and click it You will see 3 different hash values for MD5 , SHA1 , and SHA256 . We can run these algorithms against our file to verify its integrity. Windows has a PowerShell tool for this. Open a PowerShell terminal and run the following command certUtil hashfile pathtofile Algorithm EXAMPLE: certUtil hashfile Users/Administrator/Downloads/WinSCP 5.13.6 Setup.exe MD5 Part Two: Hashing Files in Windows
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Or Enter cd Downloads then,
certUtil hashfile ‘WinSCP 5.13.6 Setup.exe’ SHA1 Now you can compare the HASH value you generated to the hash value provided by the software manufacture. They should match up. Module Assessment Question 2 : Run the command again, this time check the other hash algorithms Take a screen shot of the results and paste them here:
Module Activity Description: Time Required: 15 minutes Part Three: Signing and verifying an encrypted file NOTE: The content of the plaintext.txt is “ Love and Basketball openssl genrsa -des3 -out private.pem 2048
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
openssl rsa -in private.pem -outform PEM -pubout -out public.pem Module Assessment: 1. Open a command terminal and enter: openssl dgst –sha256 –sign private.pem –out sign.sha256 plaintext.txt This command creates a signature file called “ sign.sha256 ” using our private key . This can be shared with the recipient along with our public key to verify. 2. In order to verify the file is intact we can use the following command: openssl dgst –sha256 –verify public.pem –signature sign.sha256 plaintext.txt
The output should display “ Verified OK ” if the file is intact and did indeed come from the sender. 3. Edit the plaintext.txt file by adding a single letter to the message Question 3 - Run the above verification command again shown above and paste screenshot below with the verification status.