0% found this document useful (0 votes)
343 views4 pages

1.2.1.3 Lab - Compare Data With A Hash

This document provides instructions for using a hashing program to verify the integrity of data. It describes how to create a text file, install and use a hashing program to calculate the hash value of the file, make a small change to the file, and calculate the hash value again to see if it has changed, demonstrating that the hash can be used to detect modifications to the original data.

Uploaded by

Asad Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
343 views4 pages

1.2.1.3 Lab - Compare Data With A Hash

This document provides instructions for using a hashing program to verify the integrity of data. It describes how to create a text file, install and use a hashing program to calculate the hash value of the file, make a small change to the file, and calculate the hash value again to see if it has changed, demonstrating that the hash can be used to detect modifications to the original data.

Uploaded by

Asad Mahmood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Lab – Compare Data with a Hash

Objectives
Use a hashing program to verify the integrity of data.

Background / Scenario
It is important to understand when data has been corrupted or it has been tampered with. A hashing program
can be used to verify if data has changed, or if it has remained the same. A hashing program performs a hash
function on data or a file, which returns a (usually much shorter) value. There are many different hash
functions, some very simple and some very complex. When the same hash is performed on the same data,
the value that is returned is always the same. If any change is performed on the data, the hash value returned
will be different.
Note: You will need installation privileges and some knowledge of the process to install Windows programs.

Required Resources
• PC with Internet access

Step 1: Create a Text file


a. Search your computer for the Notepad program and open it.
b. Type some text in the program.

c. Choose File > Save.


d. Navigate to Desktop.
e. Type Hash in the File name: field, and click Save.

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 4 www.netacad.com
Lab – Compare Data with a Hash

Step 2: Install HashCalc


a. Open a web browser and navigate to http://www.slavasoft.com/download.htm.

b. Click Download in the HashCalc 2.02 row.


c. Open the hashcalc.zip file and run the setup.exe file inside.

d. Follow the installation wizard to install HashCalc.

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 4 www.netacad.com
Lab – Compare Data with a Hash

e. Click Finish on the last screen, and close the README file if it opened. You may read the file if you wish.
f. HashCalc is now installed and running.

Step 3: Calculate a hash of the Hash.txt file


a. Set the following items in HashCalc:
1) Data Format: File.
2) Data: Click the … button next to the Data field, navigate to the Desktop and choose the Hash.txt file.
3) Uncheck HMAC.
4) Uncheck all hash types except MD5.
b. Click the Calculate button.
What is the value next to MD5?

Step 4: Make a change to the Hash.txt file


a. Navigate to the Desktop and open the Hash.txt file.
b. Make a minor change to the text, such as deleting a letter, or adding a space or period.
c. Click File > Save, and close Notepad.

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 4 www.netacad.com
Lab – Compare Data with a Hash

Step 5: Calculate a new hash of the Hash.txt file


a. Click the Calculate button in HashCalc again.
What is the value next to MD5?

Is the value different from the value recorded in Step 3?

b. Place a check mark next to all of the hash types.


c. Click Calculate.
d. Notice that many of the hash types create a hash of a different length. Why?

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 4 www.netacad.com

You might also like