Hashing & Cryptography Basics | TryHackMe Crypto 101 πŸ”

Learn essential hashing and cryptography concepts with TryHackMe's Crypto 101. Boost your cybersecurity knowledge and prepare for certifications with our comprehensive notes and cheat sheets!

Hashing & Cryptography Basics | TryHackMe Crypto 101 πŸ”
Motasem Hamdan
11.6K views β€’ Jul 24, 2021
Hashing & Cryptography Basics | TryHackMe Crypto 101 πŸ”

About this video

πŸš€ Cyber Security Certification Notes
https://shop.motasem-notes.net/collections/cyber-security-study-notes
πŸš€OR Certification Notes with Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
πŸ’‘Cyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog/membership
πŸ”₯Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog/e/290985
****
In this video walkthrough, we covered different hashing concepts and its algorithms as well as the goal of hashing. This was part of the web fundamentals pathway from TryHackMe.
#Hashing
#cryptography
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
******
Write up
https://motasem-notes.net/tryhackme-hashing-and-cryptography-101-tryhackme-hashing-crypto-101/
****
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.official/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
***
0:00 Introduction to Hashing and Crypto 101
0:28 Basics of Encoding and Hashing
0:52 Understanding MD5 Output Size
1:46 Can Hash Collisions Be Avoided?
2:48 Calculating Possible Hashes (8-bit Example)
4:24 Using Rainbow Tables for Hash Cracking
6:11 Should Passwords Be Encrypted or Hashed?
7:04 Recognizing Password Hashes
7:54 SHA-512 Crypt Hash Rounds
8:49 Hashcat Example for Citrix NetScaler Hashes
9:18 Length of Windows NTLM Hashes
9:52 Cracking Password Hashes (Practical Examples)
12:27 Using Hashcat for Bcrypt Hash Cracking
14:12 Online Tools for Hash Cracking
15:08 Identifying SHA-512 Crypt Hashes
15:42 General Process for Cracking Hashes
16:15 Hashing for Integrity Checking
16:56 Verifying Kali ISO SHA1 Sum
17:53 Hashcat Mode for HMAC SHA-512

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

11.6K

Likes

122

Duration

18:46

Published

Jul 24, 2021

User Reviews

4.3
(2)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.