Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to one that didn’t make sense.
This lab will show you how to encrypt data and how to use it. It will teach you how to:
The ability to protect and secure information is vital to the growth of electronic commerce and to the growth of the Internet itself. Many people need or want to use communications and data security in different areas. Encrypting the data plays a major role in security. For example, banks use encryption methods around the world to process financial transactions. This involves the transfer of large amounts of money from one bank to another. Banks also use encryption methods to protect their customers' ID numbers at bank automated teller machines.
There are many companies and even shopping malls selling anything from flowers to bottles of wines over the Internet and these transactions are made by the use of credit cards and secure Internet browsers, including encryption techniques. Customers using the Internet would like to know the connection is secure when sending their credit card information and other financial details related to them over a multi-national environment. This will only work with the use of strong and unforgeable encryption methods. Since you are an expert ethical hacker and penetration tester, your IT director will instruct you to encrypt data using various encrypting algorithms in order to secure the organization's information.
Ethical Hacking Exercises / Cryptography contains the following Exercises:
- Basic Data Encryption Using HashCalc
- Basic Data Encryption Using MD5 Calculator
- Basic Data Encryption Using Advanced Encryption Package
- Basic Data Encryption Using TrueCrypt
- Basic Data Encryption Using CrypTool
- Encrypting and Decrypting the Data Using BCTextEncoder
- Basic Data Encrypting Using Rohos Disk Encryption
The Virtual Private Cloud for this Lab set utilizes:
Ethical Hacking Exercises are available as part of the following subscription:
The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.
Lab exercises are included for:
- Footprinting and Reconnaissance
- Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Cloud Computing