From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Solution: Hashing in Kali
From the course: Cybersecurity Foundations: Computer Forensics
Solution: Hashing in Kali
(upbeat music) - [Instructor] To change the file name, type move, mv space test.txt space challenge.txt, mv space test.txt space challenge.txt, press Enter. Let's see if the file name got changed. Type ls, press Enter. There's no test.txt, but challenge.txt is the new file. Let's generate a hash value. Type sha256sum space challenge.txt Press Enter. Is the hash value the same as the one we just generated earlier? It looks the same and they are the same. Now we know changing the file name doesn't change the hash value.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Evidence preservation approaches2m 53s
-
(Locked)
Understanding the role of write blockers1m 55s
-
(Locked)
Using a software write blocker3m 52s
-
(Locked)
Using hardware write blockers2m 40s
-
(Locked)
Understanding hashing1m 21s
-
(Locked)
Hashing algorithms1m 24s
-
(Locked)
Case Study: Hashing in FTK Imager3m 47s
-
(Locked)
Understanding mounting5m 42s
-
(Locked)
Mounting manually4m 6s
-
(Locked)
Challenge: Hashing in Kali1m 33s
-
(Locked)
Solution: Hashing in Kali1m 13s
-
(Locked)
-
-
-