Lab 5.1.
Creating and Verifying Hashes in Kali
Objectives
Hash algorithms, one of many types of cryptography, are one-way cryptographic algorithms
meant to create a signature specific to a set of data. Hashes are often used to compare files for
integrity and to protect passwords. A hashed password is stored on a system and then
compared with the plaintext password generated when a user logs in so that the plaintext
password is never stored on a system. Of the many hashing algorithms, SHA-3 variations are
currently the most secure hashing algorithms available.
After completing this lab, you will be able to do the following:
• Create an MDS hash for a file
• Create various SHA hashes for a file
• Understand how to compare hashes
Materials Required
This lab requires the following:
• Kali VM created in Lab 1.4
1
Lab 5.2. Creating Insecure and Secure ZIP Archives in Kali Linux
Objectives
ZIP archives are one of many formats available in Linux to archive many files in one file. While
not compressed by default, compression is an option and is often the reason for creating ZIP
archives. ZIP archives can also be secured through encryption with the use of a password. Both
the zip and unzip commands are installed by default in Kali Linux and are therefore available for
immediate use. This may not be the case with every distribution of Linux.
Atter completing this lab, you will be able to do the following:
• Create an insecure ZIP archive in Kali Linux
• Create a secure ZIP archive in Kali Linux
• Understand the difference between the secure and insecure ZIP archives
Materials Required
This lab requires the following:
• Kali VM from Lab 1.4
2
Lab 5.3. Cracking Encrypted ZIP Archives
Objectives
While ZIP archives can be secured using a password, the weaknesses in the security of the files
lie in the password itself. Shorter passwords are easier to crack Simpler passwords are also
cracked more quickly than more complex ones. Kali has many tools security professionals can
use to test the security posture of an organization. These tools include policies, such as a
password policy.
After completing this lab, you will be able to do the following:
• Crack a password on a ZIP archive
• Understand how the strength of passwords affects the ability for an attacker to crack
them
Materials Required
This lab requires the following:
• Kali VM from Lab 1.4
• Completed Lab 5.2
• Lab partner