From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Understanding hashing

Understanding hashing

- [Instructor] Now, hashing is a one-way function and is used to verify that data hasn't been modified by an attacker or by an authorized user, and this applies to data and applies to system configurations and so on. Let's go over an example on how hashing works, and in this case, we have three files in this system, file1, file2, and file3. The contents of each of the files is different, so if I open file1, you see that it basically just says, "this is file 1", if I open file2, it says, "THIS IS FILE 2", and, of course, the contents of file3 is something different, this is a third example. Hash checksums can detect data corruption and can detect whether an attacker or unauthorized user has modified data, and in this case, I'm in a Linux system, there's a utility called shasum to generate that checksum. And actually, before I go into the utility, there are two different main hashing algorithms. One is called SHA, and there are different permutations of them, we will go over that later,…

Contents