Hacklog Volume 1 Anonymity: it security & Ethical Hacking Handbook



Download 2,32 Mb.
Pdf ko'rish
bet32/57
Sana01.01.2022
Hajmi2,32 Mb.
#289651
1   ...   28   29   30   31   32   33   34   35   ...   57
Bog'liq
Hacklog Volume 1 Anonymity IT Security Ethical Hacking Handbook

Figure 24: screenshot from the HashTab program for Windows


7.1.1.3 Checksum in common use
At the beginning of this paragraph, we explained how checksum ensure the
integrity  of  a  piece  of  information:  this  statement  is  true,  however,  as  long  as
you’re the only one who generated it or if the checksum origin for the counter-
verification cannot be manipulated. The checksum, as we observed it, acts as a
file fingerprint but doesn’t guarantee the origin of the checksum you’re going to
use for the comparison. If someone manages to violate a website and the hosted
files,  they  wouldn’t  mind  too  much  changing  the  checksum  in  the  page,  would
they?
Using hashes without any digital signature may be useful only to verify your
personal data, since they can be only altered by external attacks. In this case, the
owner  will  adopt  the  right  measures  to  keep  safe  the  original  checksum  and
compare it when needed, but they cannot use it as a stamp or seal to guarantee
the integrity verification of a file. For the time being, then, no tool is available
yet  to  verify  if  what  we  want  to  download  from  the  web  is  exactly  what  we
expect  –  we  will  return  to  this  topic  on  the  chapter  about  PGP/GPG  for  data
integrity.
7.2 Data Encryption
Now we should be informed enough about navigation and using anonymity
tools on Internet. What we’re still lacking is a good preparation of the workspace
and a minimal knowledge of the tools we can use to leave no traces pointing to
our activities on our computer. Imagine you are a Silk Road 3.0 (or the current
version) user or a member of any community where the subscription itself could
put you in serious trouble... you certainly don’t want to be identified by anyone,
aren’t you? Keep in mind that NSA caught dozens of drug dealers and customers
through their user names and passwords on Silk Road.
Curious  is  the  fact  that,  after  all  the  precautions  taken,  the  computer
formatted,  TOR  freshly  installed,  a  brand  new  Bitcoin  wallet  and  whatnot,  one
still  gets  caught,  because  their  password  contained  their  cellphone  number.  No
joke. Since we already mentioned the secure protocols, we know the importance
of  message  encryption.  This  operation  is  applicable  both  to  the  connection  and
the  silent  data,  as  well  as  to  the  messages  we  share  with  other  users  (friends,
family, sellers, etc.).
7.2.1 PGP, Pretty Good Privacy


When it comes to data encryption, we cannot avoid mentioning PGP (Pretty
Good  Privacy)  a  tool  that  encrypts,  decrypts  and  signs  text,  emails,  files  and
directories to improve your documents safety. It works as follows: the user who
wants to encrypt the message will create two keys – one public and one private.
The  public  key  allows  anyone  to  send  you  an  encrypted  message,  while  the
private one is the only key that unlocks the message created by the public key,
allowing you to read it.
This is essentially the encryption behind most of the IT communications: the
public/private  system  is  also  known  as  Asymmetric  Encryption  (or  Diffie-
Hellman), while using a single key (using PGP anyway) is defined as Symmetric
Encryption.  If  you  lose  the  private  key  in  PGP,  consider  the  protected
information as lost for good.
7.2.2 GPG, GNU Privacy Guard
The  GNU  Privacy  Guard  (from  now  on,  GPG)  tool  suite  is  available  for
Windows,  macOS,  Linux  and  BSD.  It  was  created  as  a  free  alternative  to  PGP,
from  which  it  inherited  the  OpenPGP  encryption  standard.  Let’s  then  consider
the  GPG  as  a  free  alternative  to  PGP,  the  software  which  created  the  standard
used by GPG to work. Besides the CLI version, GPG
[84]
is also available as:
-
GPGTools
[85]
, a tool suite for macOS
-
GPG4Win
[86]
, a client for Windows
-
gpg4usb
[87]
, a version designed to run only on USB (Windows and Linux)
-
… and many more!
GPG is available by default in many GNU/Linux distros. If you prefer the UI
mode, you can use seahorse (the same used by Tails). From now on, we will use
the terminal quite often, since the UI is intuitive enough. All file operations can
be done using the right button, then selecting the items available according to the
situation.  In  case  of  doubt,  you  should  first  learn  the  command  line  procedure,
then try with the UI mode.
7.2.2.1 Understanding the public/private key
We explained the difference between the private and the public key above, so


there’s  no  need  to  reiterate  it;  that’s  enough  to  understand  how  they  work.
Summarizing:
-
     
The private key must remain a secret, it’s yours and you shouldn’t share it
with anyone.
-
     
The private key must remain a secret, it’s yours and you shouldn’t share it
with anyone.
To  simplify,  the  relationship  between  the  private  and  the  public  key  is:  a

Download 2,32 Mb.

Do'stlaringiz bilan baham:
1   ...   28   29   30   31   32   33   34   35   ...   57




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish