From the course: Performing a Technical Security Audit and Assessment
File integrity checking tool demo
From the course: Performing a Technical Security Audit and Assessment
File integrity checking tool demo
- [Instructor] To illustrate how file integrity checking works, I'll use the Hash Tool, which is a simple free file hashing utility from DigitalVolcano. I have the Hash Tool open and I'll select a file I'd like the tool to generate a hash for. You can see the Hash Tool has generated this long string of characters. This is the hash of the file's contents. We'll use this as our baseline hash. Now I'll go into the file and make a small change. I'll just delete this comma and save the file. Now I'll run a validation hash of the file and see what happens. We can see that these hashes are completely different, even though I only made a small change. Now I'll go back into the file and replace the comma. Then I'll rerun the hash. Here you can see that by replacing the comma, the hash is once again the same as the baseline, and I've restored the integrity of the file. While you may not use hash tools in exactly this way to conduct security assessments, this demo showed you the principle behind file integrity checking.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Baseline skill sets for security reviews2m 21s
-
(Locked)
Conduct documentation reviews1m 58s
-
(Locked)
Conduct log reviews2m 8s
-
(Locked)
Conduct ruleset reviews2m 18s
-
(Locked)
Conduct system configuration reviews2m 51s
-
(Locked)
Conduct network sniffing1m 19s
-
(Locked)
Network sniffing tool demo: Wireshark2m 16s
-
(Locked)
Conduct file integrity checking2m 39s
-
File integrity checking tool demo1m 21s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews2m 37s
-
-
-
-
-
-
-