Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to one that didn’t make sense.
Objective
- Use encrypting/decrypting commands
- Generate hashes and checksum files
Scenario
There are many companies and even shopping malls selling anything from flowers to bottles of wines over the Internet and these transactions are made by the use of credit cards and secure Internet browsers, including encryption techniques. Customers using the Internet would like to know the connection is secure when sending their credit card information and other financial details related to them over a multi-national environment. This will only work with the use of strong and unforgeable encryption methods. Since you are an expert ethical hacker and penetration tester, your IT director will instruct you to encrypt data using various encrypting algorithms in order to secure the organization's information.
Cryptography Exercises
Ethical Hacking Exercises / Cryptography contains the following Exercises:
- Basic Data Encryption Using HashCalc
- Basic Data Encryption Using MD5 Calculator
- Basic Data Encryption Using Advanced Encryption Package
- Basic Data Encryption Using TrueCrypt
- Basic Data Encryption Using CrypTool
- Encrypting and Decrypting the Data Using BCTextEncoder
- Basic Data Encrypting Using Rohos Disk Encryption
The Virtual Private Cloud for this Lab set utilizes:
Ethical Hacking Exercises are available as part of the following subscription:
The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.
Lab exercises are included for:
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Cloud Computing
- Cryptography