The platform develops virtual classrooms that not only allow users
  to deploy training environments with the click of a button, but also reinforce
  learning by adding a question-answer approach. Its a comfortable experience to
  learn using pre-designed courses which include virtual machines (VM) hosted in
  the cloud.
TryHackMe Cryptography for dummies
While using a question-answer model does make learning
  easier, TryHackMe allows users to create their own virtual classrooms to teach
  particular topics enabling them to become teachers. This not only provides
  other users with rich and varied content, but also helps creators reinforce
  their understanding of fundamental concepts.
Room
  :-
  https://tryhackme.com/room/cryptographyfordummies
Cryptography is a big topic. We are going to cover the basics, to give you a basic
  understanding.
It is used by a wide range of applications, almost
  everywhere in the internet.
  
Why we need cryptography?
  
Without encryption communications over the internet will be very
  insecure, and it would be very easy for someone to see your data. Fortunately
  this isn't true, and almost all of the data you get/send over the internet is
  encrypted and cannot be seen in plain text by someone who got access to it.
  Now let's look into cryptography in more detail.
I understand
  why cryptography is important!
Task 2 Types of cryptography
  
There are two types of cryptography :
- Symmetric
 - Asymmetric
 
What is symmetric cryptography?
  
Let's say Alice wants to send message to Bob, but she doesn't want to
  send the message in plain text because anyone can read it.
She 
  has a recipe how to mess up the letters in a way that no one can understand
  what it means(that is called encryption). Bob has the same recipe but he uses
  it to order them so it will become readable again(that is called decryption),
  and he will understand what Alice wrote. The recipe in cryptography is called
  a key.  In symmetric cryptography both users have the same key to encrypt
  and decrypt the messages.
What is asymmetric cryptography?
  
In asymmetric cryptography the encryption and decryption keys are
  different. The encryption key can be used only for encryption, not for
  decryption and vice versa. The encryption key is called Public key and the
  decryption key is called Private key.
Why is asymmetric cryptography used?
  
Well..because it's more secure! If you are using symmetric cryptography
  and someone takes your key he can encrypt and decrypt messages that you send.
  While in asymmetric cryptography he can't decrypt the messages you encrypted
  with the public key. Only the holder of the Private key can decrypt them.
  Let's give an example :
Alice wants to talk to Google
Google
  gives Alice the Public key.
Alice encrypts her message with the
  public key and sends it to Google.
Google decrypts the message with
  his private key and sends back what Alice wanted.
And that's how
  the conversation goes...
Note : Symmetric
  cryptography is faster than asymmetric, but asymmetric is more secure.
Now
  let's see what you've learned!
1) What type of cryptography is more secure?
Ans :- Asymmetric 
2) What type of cryptography is faster?
Ans :- Symmetric 
3) What type of cryptography will a Bank site use?
Ans :- Asymmetric 
4) What will you use to encrypt your messages in asymmetric
    cryptography?
Ans :- public
5) What will you use to decrypt messages in asymmetric
    cryptography?
Ans :- private 
6) Does symmetric cryptography use two different keys for
    encryption/decryption? (aye/nay)
Ans :- Nay
Task 3 What is a hash?
  
Hashes are a long strings of letters and numbers generated by
  hashing algorithms. They take plain text and make it a hash.
The
  important thing about hashes is that they are not reversible. There's no way
  to decrypt/decode a hash.
Popular hashing algorithms are : MD5
  (Message Digest 5) and SHA (Secure Hash Algorithm).
That's how the
  word "hello" looks as MD5 hash : 5d41402abc4b2a76b9719d911017c592
What are hashes used for?
  
The most popular use of hashes is for file identification and
  storing sensitive data, like passwords. When you create an account on a
  website your password is converted to hash and this hash is stored in the
  server's database. So when you login the password that you type in will be
  converted to a hash, the server will take it and compare it with the hash in
  it's database, if it's the same that means your password is correct and the
  server will let you in.
MD5 hashes are also used to ensure
  the data integrity of files. Because the MD5 hashing algorithm always produces
  the same output for the same given input, it can be used to compare a hash of
  the source file with a newly created hash of the destination file to check
  that it is intact and unmodified.
There are plenty of other
  hashing algorithms out there, but this room is intended for beginners so we're
  not going to cover them here.
1) What's the MD5 hash of "hashes are cool"?
Ans :- f762d32e3c160900d94b683e927555b9
2) What does MD5 stand for?
Ans :- Message Digest 5
3) created MD5?
Ans :- Ronald Rivest
Task 4 Decoding/encoding
  
There's difference between encoding and encrypting. Let's say you
  have an encrypted file, the only way to decrypt it is using key. While encoded
  data can be decoded immediately, without keys. It's NOT a form of encryption,
  it just a way of representing data.
A very popular encoding is
  Base64. Here's how "hi there" looks with Base64 encoding : aGkgdGhlcmU=
1) Encode the string "cryptographyisuseful" with Base64
Ans :- Y3J5cHRvZ3JhcGh5aXN1c2VmdWw=
2) Decode the string "dGhlIHNlY3JldCB3b3JkIGlzIDogd2F0ZXJtZWxvbg==". What's
    the secret word?
Ans :- watermelon
Disclaimer
  This was written for educational purpose and pentest only.
The author
  will not be responsible for any damage ..!
The author of this tool is not
  responsible for any misuse of the information.
You will not misuse the
  information to gain unauthorized access.
This information shall only be
  used to expand knowledge and not for causing  malicious or damaging
  attacks. Performing any hacks without written permission is illegal ..!
All
  video’s and tutorials are for informational and educational purposes only. We
  believe that ethical hacking, information security and cyber security should
  be familiar subjects to anyone using digital information and computers. We
  believe that it is impossible to defend yourself from hackers without knowing
  how hacking is done. The tutorials and videos provided on www.hackingtruth.in
  is only for those who are interested to learn about Ethical Hacking, Security,
  Penetration Testing and malware analysis. Hacking tutorials is against misuse
  of the information and we strongly suggest against it. Please regard the word
  hacking as ethical hacking or penetration testing every time this word is
  used.
All tutorials and videos have been made using our own
  routers, servers, websites and other resources, they do not contain any
  illegal activity. We do not promote, encourage, support or excite any illegal
  activity or hacking without written permission in general. We want to raise
  security awareness and inform our readers on how to prevent themselves from
  being a victim of hackers. If you plan to use the information for illegal
  purposes, please leave this website now. We cannot be held responsible for any
  misuse of the given information.
- Hacking Truth by
  Kumar Atul Jaiswal
I hope you liked this post, then you
  should not forget to share this post at all.
Thank you so much :-)

0 comments:
Post a Comment
For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.