EGL202 Cyber Security Essentials
Lab 1 Compare Data with a Hash
A. Objectives
Use a hashing program to verify the integrity of data.
B. Introduction
It is important to understand when data has been corrupted or it has been tampered with. A
hashing program can be used to verify if data has changed, or if it has remained the same. A
hashing program performs a hash function on data or a file, which returns a (usually much shorter)
value.
There are many different hash functions, some very simple and some very complex. When the
same hash is performed on the same data, the value that is returned is always the same. If any
change is performed on the data, the hash value returned will be different.
Note:
You will need installation privileges and some knowledge of the process to install Windows
programs.
Task 1: Create a Text file
1) Search your computer for the Notepad program and open it.
2) Type some text in the program.
Cyber Security Essentials Page 1 Effective date: 05 Mar 2021
3) Choose File > Save.
4) Navigate to Desktop.
5) Type Hash in the File name: field, and click Save.
Task 2: Install HashCalc
1) Open a file explorer and locate the folder location of HashCalc in E Drive in the folder
EG2762.
2) Double click and run the setup.exe file inside.
3) Follow the installation wizard to install HashCalc.
4) Click Finish on the last screen, and close the README file if it opened. You may read
the file if you wish.
Cyber Security Essentials Page 2 Effective date: 05 Mar 2021
5) HashCalc is now installed and running.
Task 3: Calculate a hash of the Hash.txt file
1) Set the following items in HashCalc:
Data Format: File.
Data: Click the … button next to the Data field, navigate to the Desktop and
choose the Hash.txt file.
Uncheck HMAC.
Uncheck all hash types except MD5.
2) Click the Calculate button.
What is the value next to MD5?
418971d10406b135559a6edc067ca305
Cyber Security Essentials Page 3 Effective date: 05 Mar 2021
Task 4: Make a change to the Hash.txt file
1) Navigate to the Desktop and open the Hash.txt file.
2) Make a minor change to the text, such as deleting a letter, or adding a space or period.
3) Click File > Save, and close Notepad.
Task 5: Calculate a new hash of the Hash.txt file
1) Click the Calculate button in HashCalc again.
What is the value next to MD5?
________________________________________________________________________
Is the value different from the value recorded in Task 3?
yes_____________________________________________________________________
___
2) Place a check mark next to all of the hash types.
3) Click Calculate.
4) Notice that many of the hash types create a hash of a different length. Why?
_many of the hashes use a diff number of bits to produce the
hash____________________________________________________________________
___
Cyber Security Essentials Page 4 Effective date: 05 Mar 2021