CEH Practical Guide
  • Certified Ethical Hacker (CEH v12 and CEH V13) Practical Guide: Complete Study Resources & Tips
  • Module 2. Footprinting and Reconnaissance
    • 1. Footprinting through Search Engines
    • 2. Perform Footprinting Through Internet Research Services
    • 3. Footprinting through Social Networking sites
    • 4. Website Footprinting
    • 5. WHOIS Footprinting
    • 6. DNS Footprinting
    • 7. Network footprinting
    • 8. Email Footprinting
    • 9. Footprinting using footprinting tools
    • 10. Perform Footprinting using AI
  • Module 3. Scanning Networks
    • 1. Host Discovery
    • 2. Port and Service Discovery
    • 3. Perform OS Discovery
    • 4. Scan beyond Firewalls and IDS
    • 5. Network scanning using various tools
    • 6. Perform Network Scanning using AI
  • Module 4. Enumeration
    • 1. Netbios Enumeration (Port 137)
    • 2. SNMP Enumeration (Port 161,162)
    • 3. LDAP Enumeration (Port 389)
    • 4. NFS Enumeration
    • 5. DNS Enumeration
    • 6. SMTP Enumeration
    • 7. RPC, SMB and FTP Enumeration
    • 8. Enumeration using various tools
    • 9. Perform Enumeration using AI
  • Module 5. Vulnerability Assessment
    • 1. Perform Vulnerability Research with Vulnerability Scoring Systems and Databases
    • 2. Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
    • 3. Perform Vulnerability Analysis using AI
  • Module 6. System Hacking
    • 1. Gain access to the system
    • 2. Privilege Escalation
    • 3. Maintain Remote Access and Hide Malicious Activities
    • 4. Clear Logs to hide the Evidence of Compromise
    • 5. Active Directory (AD) Attacks
  • Module 7. Malware Threats
    • 1. Gain access to systems with Trojans
    • 2. Infect the system using Virus
    • 3. Perform Static Malware Analysis
    • 4. Perform Dynamic Malware Analysis
  • Module 8. Sniffing
    • 1. Perform Active Sniffing
    • 2. Perform Network Sniffing using Various Sniffing Tools
    • 3. Detect Network Sniffing
  • Module 9. Social Engineering
    • 1. Perform Social Engineering using tools
    • 2. Detect a Phishing attack
    • 3. Audit Organization security for phishing attacks
    • 4. Social Engineering using AI
  • Module 10. Denial of Service
    • 1. Perform DOS and DDOS with various techniques
    • 2. Detect and Protect DOS and DDOS attacks
  • Module 11. Session Hijacking
    • 1. Perform Session Hijacking
    • 2. Detect Session Hijacking
  • Module 12. Evading IDS, antivirus and Honeypots
    • 1. Intrusion Detection using various tools
    • 2. Evade Firewall using Evasion Techniques
  • Module 13. Hacking Web Servers
    • 1. Footprint the Webserver
    • 2. Perform Webserver attacks
    • 3. Perform a Web Server Hacking using AI
  • Module 14. Hacking Web Applications
    • 1. Footprint the Web Infrastructure
    • 2. Perform Web applications Attacks
    • 3. Detect Web Vulnerabilities using using web application security tools
    • 4. Perform Web Application Hacking using AI
  • Module 15. SQL Injection
    • 1. Perform SQL Injection attacks
    • 2. Detect SQL Vulnerabilities using different tool
    • 3. Perform SQL Injection using AI
  • Module 16. Hacking Wireless Networks
    • 1. Footprint a wireless Network
    • 2. Perform Wireless Traffic Analysis
    • 3. Perform Wireless Attacks
  • Module 17. Hacking Mobile Platforms
    • 1. Hack Android Devices
    • 2. Secure Android Device
  • Module 18. IoT and OT Hacking
    • 1. Footprinting IoT and OT devices
    • 2. Capture and Analyze IoT traffic
    • 3. Perform IoT Attacks
  • Module 19. Cloud Computing
    • 1. Perform Reconnaissance on Azure
    • 2. S3 Bucket Enumeration
    • 3. Exploit S3 buckets
    • 4. Perform Privilege Escalation to Gain Higher Privileges
    • 5. Perform Vulnerability Assessment on Docker Images
  • Module 20. Cryptography
    • 1. Encrypt the Information using Various Cryptography Tools
    • 2. Create a self signed Certificate
    • 3. Perform Disk Encryption
    • 4. Cryptanalysis Using different tools
    • 5. Perform Cryptography using AI
  • Tips for exams
  • Additional Resources
Powered by GitBook
On this page
  • 1. Calculate hash using hashcalc
  • 2. Calculate MD5 hashes using md5 calculator
  • 3. Calculate MD5 hashes using HashmyFiles
  • 4. Perform File and Text Message Encryption using cryptoforge
  • 5. Perform File encryption using Advanced encryption package
  • 6. Encrypt and Decrypt data using BCtextEncoder
  • 6. Perform Multi-layer Hashing using CyberChef

Was this helpful?

  1. Module 20. Cryptography

1. Encrypt the Information using Various Cryptography Tools

PreviousModule 20. CryptographyNext2. Create a self signed Certificate

Last updated 6 months ago

Was this helpful?

1. Calculate hash using hashcalc

2. Calculate MD5 hashes using md5 calculator

3. Calculate MD5 hashes using HashmyFiles

4. Perform File and Text Message Encryption using cryptoforge

CryptoForge is a file encryption software for personal and professional data security. It allows you to protect the privacy of sensitive files, folders, or email messages by encrypting them with strong encryption algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network—

After encryption, extension changes to cfe. a copy of file is made in the same location.

Navigate to file. Right click it and select to encrypt. Give it a password and its encrypted

Navigate to encrypted file, Right click to decrypt it

There is also cryptoforge text, that encrypts the text with password. Type a message and click Encrypt from the toolbar.

The Enter Passphrase - CryptoForge Text dialog-box appears; type a password in the Passphrase field, retype it in the Confirm field, and click OK.

The message that you have typed will be encrypted.

Similarly, you can decrypt it.

5. Perform File encryption using Advanced encryption package

Extension changes to aep

Navigate to file. Give it a password and click to encrypt.

Navigate to encrypted file, provide the password and click to decrypt.

6. Encrypt and Decrypt data using BCtextEncoder

Encrypts with password with AES

For decoding, paste the encoded text and click decode.

6. Perform Multi-layer Hashing using CyberChef

CyberChef enables a wide array of "cyber" tasks directly in browser. It offers a wide range of operations and transformations, from basic text manipulation to complex cryptographic functions which include various hashing techniques such as MD5, SHA-1, SHA-256, SHA-512, etc., and encoding techniques such as text to hexadecimal, binary, Base64, or URL encoding.

A multi-layer hash typically refers to a hierarchical or nested structure of hash functions applied successively to data. Instead of just applying a single hash function to a piece of data, multiple hash functions are employed in layers or stages, with the output of one hash function serving as the input to the next one.

Create a new text file Secret.txt and open it. Write some text in it (here, My Account number is 0234569198) and press Ctrl+S to save the file. Close the text file.

Launch any web browser, and visit

CyberChef website appears, click on Open file as input button present at the top of the Input section. Upload the file.

The contents of the Secret.txt file will be displayed in the Input window.

Now, we will calculate MD5 hash of the Secret.txt file, to do so, in the search field present under Operations section, type md5 and drag MD5 from the results in the Operations section in to the Recipe section.Alternatively, you can expand Hashing node in the Operations section and select MD5 algorithm.

The tool calculates the MD5 hash of the given input file and displays the output in the Output section.

Similarly, You can calculate different types of Hashes.

SlavaSoft Downloads
MD5 Calculator
HashMyFiles: Calculate MD5/SHA1/CRC32 hash of filesNirSoft
Encryption Software | Data Encryption Software
Logo
Logo
File Encryption Software
CyberChef
Logo
Encrypt Text with BCTextEncoder | Jetico
Certified Ethical Hacker (CEHv12) Practical hands on LabsUdemy
CEH Practical Full Course
Logo
Logo