From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Understanding hashing
From the course: Cybersecurity Foundations: Computer Forensics
Understanding hashing
- [Instructor] Hashing plays a vital role in computer forensics. It ensures that a data copy you make remains identical to its source. Hashing refers to the process of transforming an input, which is usually a file into an output, which is a unique string associated with that file. There are some significant characteristics you should know about hashing. First, any slight changes you make in a file will get amplified in considerable changes in its hash value. This behavior makes it very easy to detect changes made to a file by accident or on purpose. Hashing ensures data integrity, meaning no intended changes are made in the data. In the context of computer forensics, this means the evidence drive remains the same during your investigation. That is, a forensic image or copy of the evidence drive stays the same. Therefore, hashing is an essential part of your computer forensics investigation. Any non-trivial computer…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Evidence preservation approaches2m 53s
-
(Locked)
Understanding the role of write blockers1m 55s
-
(Locked)
Using a software write blocker3m 52s
-
(Locked)
Using hardware write blockers2m 40s
-
(Locked)
Understanding hashing1m 21s
-
(Locked)
Hashing algorithms1m 24s
-
(Locked)
Case Study: Hashing in FTK Imager3m 47s
-
(Locked)
Understanding mounting5m 42s
-
(Locked)
Mounting manually4m 6s
-
(Locked)
Challenge: Hashing in Kali1m 33s
-
(Locked)
Solution: Hashing in Kali1m 13s
-
(Locked)
-
-
-