L ab M a n u a l
C r y p to g r a p h y M o d u le 19
M odule 19 - C ryptography
C r y p to g r a p h y
Lab Scenario
T h e a b ility to p r o te c t a n d s e c u re in fo r m a tio n to th e g ro w th and o f th e is v i t a l t o th e g r o w th o t e le c tr o n ic need o r w a n t th e d a ta m e th o d s c o m m e rc e and I n t e r n e t it s e lf. M a n y p e o p le
Test yo u r
to
u s e c o m m u n ic a t io n s a m a jo r r o le to
111
d a ta
p la y s
** W e b e x e rc is e
s e c u r it y .
a ro u n d la r g e
th e w o r ld
p ro c e s s
f in a n c ia l tr a n s a c tio n s . T h is in v o lv e s one b an k ID to a n o th e r. B a n k s n u m b e rs at a ls o
tra n s fe r o f e n c r y p t io n t e lle r
a m o u n ts to
o f m o n e y
fro m
W o r k b o o k re\
m e th o d s
p ro te c t
t h e ir
c u s to m e rs
b an k
a u to m a te d
m a c h in e s . T h e r e fro m m ade f lo w e r s b y th e to
a re m a n y c o m p a n ie s b o ttle s o f o f w in e s c r e d it
and even th e
s h o p p in g m a lls and th e s e
s e llin g a n y d u n g tr a n s a c tio n s a re
o ve r
In te rn e t
use
c a rd s
and u s in g
s e c u re th e
In te rn e t
b ro w s e rs , lik e to
in c lu d in g k n o w and th e
e n c r y p t io n c o n n e c tio n f in a n c ia l o n ly yo u
te c h n iq u e s . is s e c u re
C u s to m e rs w h e n to
I n te r n e t w o u ld c a rd
s e n d in g th e m o ve r
t h e ir a
c r e d it
in fo r m a tio n e n v ir o n m e n t
o th e r w ill
d e t a ils w ith
r e la t e d th e use
m u lt i- n a t io n a l
T in s
w o rk a re an
o f s tro n g hacker
and and
u n fo r g e a b le p e n e tr a t io n
e n c r y p t io n te s te r, y o u r
m e th o d s . IT
S in c e w ill to
e x p e rt to
e t h ic a l
d ir e c to r
111
in s tr u c t
yo u
e n c ry p t
d a ta
u s in g
v a r io u s
e n c r y p t in g
a lg o r it h m s
o rd e r
s e c u re th e o r g a n iz a t io n s in f o r m a t io n .
Lab Objectives
T in s la b w i l l s h o w y o u h o w h o w to : U s e e n c r y p tin g /d e c r y p tin g c o m m a n d s G e n e r a te h a s h e s a n d c h e c k s u m f ile s to e n c r y p t d a ta a n d h o w t o u s e it . I t w i l l te a c h y o u
Lab Environment
& Tools d e m o n stra te d in th is lab a re available in D:\CEHTools\CEHv 8 Module 19 Cryptography
T o e a r n o u t d ie la b , y o u n e e d : A A c o m p u te r r u n n in g
w e b b ro w s e r w ith In te rn e t access
Lab Duration
T im e : 5 0 M in u t e s
Overview of Cryptography
C r y p t o g r a p h y is t h e p r a c t ic e a n d s t u d y o f
hiding
in f o r m a t io n . M o d e r n c r y p to g r a p h y
in t e r s e c t s t h e d i s c ip l in e s o f m a t h e m a t i c s , c o m p u t e r s c ie n c e , a n d e l e c t r ic a l e n g in e e r in g .
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
C r y p t o lo g y p r io r t o th e m o d e r n a g e w a s a lm o s t s y n o n y m o u s w it h
encryption,
d ie
conversion
o f in fo r m a tio n f r o m
a r e a d a b le s ta te t o o n e a p p a r e n t ly w i t h o u t s e n s e .
m . TASK 1
Overview
Lab Tasks
R e c o m m e n d e d la b s t o a s s is t y o u i n C r y p t o g r a p h y : B a s ic D a t a E n c r y p t in g U s i n g B a s ic D a t a E n c r y p t i n g U s i n g B a s ic D a t a E n c r y p t i n g U s i n g B a s ic D a t a E n c r y p t i n g U s i n g B a s ic D a t a E n c r y p t i n g U s i n g
H ashC alc MD5 C alc u lato r A dvance E ncryption P a c k a g e TrueC rypt CrypTool B C T extE ncoder
E n c r y p t in g a n d D e c r y p t in g th e D a ta U s in g B a s ic D a t a E n c r y p t i n g U s i n g
Lab Analysis
A n a l y z e a n d d o c u m e n t t h e r e s u lt s r e la t e d t o t h e la b e x e r c is e . G i v e y o u r o p i n i o n o n y o u r t a r g e t s s e c u r it y p o s t u r e a n d e x p o s u r e .
P L E A S E
T A L K
T O
Y O U R
I N S T R U C T O R T O T H I S
I F
Y O U L A B .
H A V E
Q U E S T I O N S
R E L A T E D
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Lab
B a s ic
D a ta
E n c r y p tin g
U s in g
H a s h C a lc
HashCalc e n a b le s you t oc o m p u t em u ltip leh a s h e s ,c h e c k s u m s ,a n dHAL4Csfor files, te x t, a n dh e xs t r in g s . It s u p p o r t sMD2, MD4, AIDS, SHA1, SHA2 (SHA256, SH.4J84, SHA512), RIPEMD160, PANAMA, TIGER, CRCJ2,ADUERJ2, a n dt h eh a s hu s e din e D o n k e ya n de M n let o o ls .
ICON KEY
/ V a lu a b le
Lab Scenario
L a p to p s a re h ig h ly s u s c e p tib le r e q u ir e s to th e ft and f r e q u e n t ly s ta rt th e c o n ta in v a lu a b le s y s te m a d a ta . and B o o t d is k access th e e n c r y p t io n s to ra g e a k e y in o rd e r to o p e r a t in g d a ta
0 11
information
.v* Test yo u r _______k n o w le d g e _________
m e d ia .
D is k
e n c r y p t io n
e n c ry p ts
a ll
s y s te m ,
in c lu d in g th e
t ile s , f o ld e r s , a n d t h e o p e r a t i n g s y s t e m . T i n s is m o s t a p p r o p r i a t e w h e n o f th e th a t a re s y s te m n o t
111
W e b e x e r c is e
p h y s ic a l s e c u r it y
0 1 d e s k to p s
is a
n o t
a s s u re d .
E x a m p le s
in c lu d e W h e n to
tr a v e lin g p r o p e r ly th e d a ta ,
la p to p s
Q W o r k b o o k r e v ie w
p h y s ic a lly enhanced
s e c u re d
a re a .
im p le m e n te d , w h ile p a r t ie s e t h ic a l
e n c r y p t io n ca n n o t o f
p r o v id e s be
an
le v e l o f a s s u ra n c e d is c o v e r e d
111
e n c ry p te d ,
111
v ie w e d lo s s ,
0 1 o th e r w is e
b y to
u n a u th o r iz e d be an e x p e rt
th e
even t and
th e ft,
0 1 in te r c e p t io n .
o rd e r
hacker
p e n e tr a t io n
te s te r ,
yo u
m u st
u n d e rs ta n d
d a ta
e n c r y p t io n
u s in g e n c r y p t in g a lg o r it h m s .
Lab Objectives
T h i s la b w i l l s h o w y o u h o w h o w to : U s e e n c r y p tin g /d e c r y p tin g c o m m a n d G e n e r a te h a s h e s a n d c h e c k s u m f ile s to e n c r y p t d a ta a n d h o w t o u s e it . I t w i l l te a c h y o u
Lab Environment
T o c a r r y o u t t h e la b , y o u n e e d :
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Y o u
c a n a ls o d o w n lo a d t h e la t e s t v e r s io n o f
H ash C alc
fro m
th e lin k
h t t p : / / w w w . s la v a s o t t. c o m / h a s h c a lc / I f y o u d e c id e t o
1 1 1 t h e la b
d o w n lo a d th e
la te s t v e rsio n ,
t h e n s c r e e n s h o ts s h o w n
m ig h t d iff e r
F o llo w
th e w iz a r d d r iv e n in s ta lla t io n in s tr u c t io n s
R u n t in s t o o l 1 1 1
W indow s S e rv e r 2012
r u n to o ls
A d m in is t r a t iv e p r iv ile g e s t o
Lab Duration
T im e : 1 0 M in u te s
Overview of Hash
H a s h C a lc is a fa s t and and o f e a s y -to -u s e c a lc u la t o r th a t a llo w s c o m p u t in g m essage It
d ig e sts, ch e c k su m s,
o ffe r s a c h o ic e o f 13 c a lc u la t io n s .
as w e ll as f o r hash and
p o p u la r
checksum
fo r
TASK 1
Lab Tasks
1. L a u n ch th e
C alculate th e H ash
S ta rt
m e n u b y h o v e r in g th e m o u s e c u r s o r o n th e lo w e r - le ft
c o r n e r o f th e d e s k to p .
c a
Y o u can also
**I
i v
i ^
H ash C alc
a p p to
o p e n th e
H ashC alc
w in d o w .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
S ta rt
Server Manager Windows PowerShell m Contfol Panel Google Chrome <9 Hyper-V Virtual Machine... Hyper-V Manager
Fa
Computer
V
Command Prompt
&
e
Inlrmr* i*plnm
5
Nmap Zenmap GUI
<
HashCalc
3.
T h e m a in w in d o w f ig u r e .
o t
H ashC alc
a p p e a rs as s h o w n 111 d ie
f o llo w in g
4.
F ro m
d ie
D ata F o rm at
H
Data Format:
d r o p - d o w n lis t , s e le c t
File.
1 T x
HashCalc
Data: 1
1-
-1 Key:
W MD5
r lv MD4 SHA1 SHA256 SHA384 SHA512 RIPEMD160 PANAMA TIGER MD2 A D LER 32
r r
r I* r
H ash algorithm s
r r
1
| Calculate | Close 1 Help 1
S la v a S o ft
6.
7.
C h o o s e th e a p p r o p r ia te N o w , c lic k
H ash a lg o rith m s
C alcu late.
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
HashCalc
Data Format: Data:
IS
r HMAC
IT ext shing |
R r
MD5 MD4
e922301da3512247ab71407096ab7810
W SHA1
67559307995703808ed2f6n723e00556dbb0e01
HashCalc is used to
r r r
r r r
W CRC32
eD onkey/ eMule
S la v a S oft.
Calculate ~|
Help
Lab Analysis
D o c u m e n t a ll H a s h , A J D 5 , a n d C R C v a lu e s f o r f u r t h e r r e fe r e n c e .
P L E A S E
T A L K
T O
Y O U R
I N S T R U C T O R T O T H I S
I F
Y O U
H A V E
Q U E S T I O N S
R E L A T E D
L A B .
T o o l/U tility
I n f o r m
a tio n
C o lle c te d /O b je c tiv e s
A c h ie v e d
O u tp u t:
G e n e ra te d H a s h e s f o r
H a s h C a lc
M D 5 S H A 1 R IP E A ID 1 6 0 C E C 3 2
Questions
1. D e te r m in e h o w to c a lc u la t e m u lt ip l e c h e c k s u m s s im u lt a n e o u s ly .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
I n te r n e t
C o n n e c tio n
R e q u ir e d
Yes
P la tfo r m S u p p o rte d
No
C la s s r o o m
!L a b s
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
B a s ic
D a ta
E n c r y p tin g
U s in g
M D 5
C a lc u la to r
MD5 Calculator is a s im p le a p p lic a tio n that c a lc u la t e st h eAIDS h a s h of a g iv e nfile. It c a nb eu s e dnith b ig files ( s o u / eGB). Itfeatures ap r o g r e s sc o u n t e r a n d a textfieldfrom w h ic ht h efinal AID h a s hc a nb ee a s ily c o p ie dt ot h e c lip b o a r d . con
__ V a lu a b le
in f o r m a t i o n
key
Lab Scenario
T h e re has been a need to p ro te c t th a t c o u ld a g a in s t in fo r m a tio n o th e r w is e such fro m p r y in g e y e s . 111 th e o r e le c tr o n ic a g e , in fo r m a tio n can a ls o be b e n e fit o r o r e d u c a te a g ro u p
>>
Test your k n o w le d g e
in d iv id u a l e s p io n a g e s e c u r it y
used
g ro u p s
in d iv id u a ls . r e q u ir e s w is h to th a t
In d u s tr ia l e x te n s iv e t h e ir a ls o
am ong
h ig h ly be p u t
c o m p e t it iv e in to p la c e .
b u s in e s s e s A n d , th o s e
o fte n w h o
W e b e x e r c is e
m e a s u re s
e x e r c is e m ay
p e rs o n a l fre e d o m ,
W o r k b o o k r e v ie w
o u t s id e
o f th e
o p p r e s s iv e to a v o id
n a tu re
o f g o v e rn m e n ts , th e p e n a lt ie s th e
w is h
to
e n c ry p t
c e r ta in
in fo r m a tio n w h o
s u ffe r in g c o n t r o l.
o f g o in g o t d a ta
a g a in s t t h e e n c r y p t io n a re used to
w is h e s and
o f th o s e
a tte m p t to
S t ill,
m e th o d
d e c r y p t io n th e
a re r e la t iv e ly d a ta eyes. and
111
s tr a ig h t fo r w a r d ; e n c r y p t io n s y s te m be d a ta an in fo r m a tio n e x p e rt e t h ic a l u s in g
a lg o r it h m s o n th e and
e n c ry p t Iro m te s te r,
it
s to re s to
t ile s
s y s te m ,
s a fe
p r y in g yo u
o rd e r
hacker
p e n e tr a t io n a lg o r it h m s .
m u st
u n d e rs ta n d
e n c r y p t io n
e n c r y p t in g
Lab Objectives
T in s la b w i l l g iv e y o u e x p e r ie n c e o n e n c r y p t in g d a ta a n d s h o w y o u h o w t o d o it .
I t w ill te a c h y o u h o w
to :
Lab Environment
T o e a r n * o u t t h e la b , y o u n e e d :
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
MD5 C a lc u la to r
fro m
th e
lin k h t tp : / / w w w . b u llz 1p .c o m / p r o d u c t s / m d 5 / in f o . p h p I f y o u d e c id e t o
1 1 1 t h e la b
d o w n lo a d th e
la te s t v ersio n ,
th e n
s c re e n s h o ts s h o w n
m ig h t d iff e r
F o llo w
th e w iz a r d d r iv e n in s ta lla t io n in s t m c t io n s
R u n t h is t o o l 1 1 1
W indow s S e rv e r 2012
t o o ls
A d m in is t r a t iv e p r iv ile g e s t o r u n
Lab Duration
T im e : 1 0 M in u te s
M D 5
f ile s . W h i l e it s l a y o u t le a v e s s o m e d u n g t o b e d e s ir e d , it s r e s u lt s a r e f a s t a n d s im p le .
TASK 1
C alculate MD5 C hecksum
Lab Tasks
1. T o f in d M D 5 H a s h o f a n y t ile , r ig h t - c lic k t h e f ile th e c o n te x t m e n u . a n d s e le c t
MD5
C a lc u la to r
fro m
mw| |
I L&
nd5calc( 0 .0).ms
Install Repair Uninstall CmdHere MD5 Calculator Troubleshoot compatibility Open with Share with Add to archive... Add to "md5calc(1.0.0.0).rar" Compress and email... m
M D 5 checksum is
Compress to "md5calc(1.0.0.0).rar" and email Restore previous versions Send to Cut Copy Create shortcut Delete Rename Properties *
MD5 C a lc u la to r
s h o w s th e M D 5
d ig e s t o f t h e s e le c te d t ile .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
th e
Note: A l t e r n a t i v e l y , y o u C a lc u la te b u t t o n t o
c a n b r o w s e a n y file c a lc u la t e t h e M D 5
to
c a lc u la t e t h e M D 5
h a s h a n d c lic k
h a s h o f th e file .
MD5 Calculator
B|C:\Llsefs'.Administrator\DesktopVnd5calcl'1.0.0.0).i
M D 5 hash (or checksum) fu n ctio n s as a com pact d igital fin g e rp rin t o f a file.
. -
' Calculate J
Compare To
1 1
Exit
Lab Analysis
A n a l y z e a n d d o c u m e n t d i e r e s u lt s r e la t e d t o d i e la b e x e r c is e .
P L E A S E
T A L K
T O
Y O U R
I N S T R U C T O R T O T H I S
I F
Y O U L A B .
H A V E
Q U E S T I O N S
R E L A T E D
T o o l/U tility
I n f o r m
a tio n
C o lle c te d /O b je c tiv e s
A c h ie v e d
D 5
C a lc u la to r
O u tp u t:
M D 5
H a s h e s f o r s e le c te d s o f t w a r e
Questions
1. 2. W h a t a re t h e a lte r n a t iv e s Is th e A ID S to th e A ID S sum c a lc u la t o r ? ( M e s s a g e - D ig e s t a l g o r it h m 5 ) c a lc u la t o r a w id e ly u s e d
c r y p to g r a p h ic h a s h f u n c t io n w i t h
a 1 2 8 - b it h a s h v a lu e ?
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
I n te r n e t
C o n n e c tio n
R e q u ir e d
Yes
P la tfo r m S u p p o rte d
No
!L a b s
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
3
B a s ic D a ta E n c r y p tin g E n c r y p tio n U s in g P a c k a g e A d v a n c e d
A d va n c e dEncryption P a c k a g eis m o s tn o t e w o r t h y for itsflexibility; n o to n lyc a n yon e n c r y p t filesforyouro w n p ro te c tio n ,b u tyonc a ne asilyc r e a t e "selfdecrypting' v e r s io n s of yourfiles that o t h e r sc a n ru nw it h o u tn e e d i n g this o ra n yo t h e r soft!!are.
I CON KEY
/ V a lu a b le in f o r m a tio n
Lab Scenario
D a ta s e c u re e n c r y p t io n d a ta . and d e c r y p t io n use o f a re o p e r a t io n s b lo c k b lo c k s u b je c t keys a re m a jo r such such as as s e c u r it y p u b lic A E S , as a p p lic a tio n s A E S w e ll These to M o s t s y s te m s c ip h e r s , c ip h e r s to s ta n d a rd . as o th e r a tta c k s
>>
Test your k n o w le d g e
H o w e v e r,
im p le m e n ta tio n s a lg o r it h m s , to
c r y p to g r a p h ic a llo w p o w e r
s id e - c h a n n e l d e v ic e s
a tta c k s .
W e b e x e r c is e
a d v e r s a r ie s
e x tra c t o th e r
s e c re t s id e
fro m
b y
p a s s iv e ly a re
m o n it o r in g r e q u ir e d fo r
c o n s u m p t io n , w h e re
c h a n n e ls . a tta c k s
C o u n te rm e a s u re s a th re a t. These
W o r k b o o k r e v ie w
s id e - c h a n n e l
a re
in c lu d e
s e v e ra l d a ta ,
a e ro s p a c e and
a p p lic a tio n s w h e r e r e s id e o n
p ro g ra m
i n f o r m a t i o n , c la s s if ie d n o t a lw a y s be
a lg o r it h m s , p ro te c te d .
s e c re t k e y s to be
a s s e ts
th a t m a y
p h y s ic a lly te s te r, y o u
111
o rd e r
an
e x p e r t e th ic a l h a c k e r a n d
p e n e tr a t io n
m u s t u n d e r s t a n d d a ta e n c r y p t e d o v e r f ile s .
Lab Objectives
T i n s la b w i l l g iv e y o u e x p e r ie n c e o n e n c r y p t in g d a t a a n d s h o w y o u h o w I t w ill te a c h y o u h o w to : t o d o it .
U s e e n c r y p t in g /d e c r y p t in g c o m m a n d s C a lc u la te t h e e n c r y p t e d v a lu e o f t h e s e le c te d f ile
Lab Environment
T o c a r r y o u t t h e la b , y o u n e e d :
A d vanced E ncryption P a c k a g e l o c a t e d a t D:\CEH-Tools\CEHv8 M odule 19 C ry ptography\C ryptography T ools\A dvanced E ncryption Package
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
Y o u
c a n a ls o d o w n lo a d d ie la te s t v e r s io n o f fro m
A dvanced E ncryption
p ro /
P ackage
th e li n k h t t p : / / w w w . s e c u r e a c t io n . c o m / e n c r y p t io n d o w n lo a d th e
I f y o u d e c id e t o
1 1 1 t h e la b
la te s t v e rsio n ,
t h e n s c r e e n s h o ts s h o w n
m ig h t d iff e r
F o llo w
th e w iz a r d - d r iv e n in s t a lla t io n in s tr u c t io n s
R u n t in s t o o l 1 1 1
W indow s S e rv e r 2012
r u n to o ls
A d m in is t r a t iv e p r iv ile g e s t o
Lab Duration
T im e : 1 0 M in u t e s
TASK 1
Lab Tasks
1. L a u n ch th e
Encrypting a File
S ta rt
m e n u b y h o v e r in g th e m o u s e c u r s o r o n th e lo w e r - le ft
c o r n e r o f th e d e s k to p .
3 Windows Server 2012 W in d o w svmir 2 0 3 < 2 < < 1 *C arxM aKo*srm. L v l*4 t1 0 rc o sy. B u ild80:
Y o u can also
m m
do w n lo a d Advance E n c ry p tio n Package fro m h ttp ://w w w .s e c u re a c tio n .c om 2. F IG U R E 3.1: W indows Server 2012D esktop view7 C lic k th e
a p p to
o p e n th e
A dvanced
Administrator
< *rvor
row Sw H
S L o
Hyp-V Virtual
H/per-V Manager
Advanced CrxryplKXi
fL
r
Control
8 h
SQL Server installation
V
Com m and
?
Workspace Studio
V
Mozilla
S3
*
Prompt
E 5
Nmap -
HashCak
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
3.
T h e
t r ia l p e r io d
w in d o w
Try Now!.
Advanced Encryption Package 2013 Professional 0 1 1 Register Advanced Encryption Package 2013 Professional now
You m ay use AEP PRO d urin g th e tria l period. It expires in 30 days. Please click Buy Now! if yo u w o u ld like to co n tin u e using it after th a t period. You can order th e registered version online. Im m ediate online delivery is available fro m w w w .aepp ro.com
Try Now!
11
Buy Now!
1|~
Activate
]|
Cancel
o f
A dvanced E ncryption P a c k a g e
v5 67 Trial V<*in
a p p e a rs ,
sh o w
f o l i o w m g f ig u r e .
Advanced Encwlion Package 2012 Fie E-M ail Options Tools Help > a .
c:
01
j[ || ||
A d vance E n c ry p tio n
> 2 *
Encryption
<1
Password: Again:
Ridde:
128-bit key
v|
[ Pack file, then crypt Delete after encryption I Securely delete Wes Fiter C Show all files ( Apply filter... Set Output Folder ( Current folder
[7 7 7 ]
^ Custom:
------------------------------1 1 Apply |
Logflmfl:
1 1
Encrypt Now!
A dvanced E n c ry p tio n
>
Package is a sym m etric-key en cryp tio n com prisin g three b lo c k ciphers, A E S 128, A E S -192 and A E S 256. 5.
6.
E ncrypt. I t P a ssw o rd
w ill a s k y o u
to
e n te r th e p a s s w o rd . T y p e th e
th e p a s s w o rd
f ie l d , a n d a g a in t y p e t h e p a s s w o r d i n
A gain
f ie ld .
7.
C lic k
E ncrypt Now!.
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
File E M a il O p tio n s T o o ls H e lp
> fc C : A r a D: A CEH-Tods t> M CEHv Module 02 Footpmbng and Reconnaissance > CEHv Module 03 Scanrmg Networks t> >) C&tv Module 04 Enumeration ^ CEHv Module 05 System Hacking > J4 C&tv Module 07 Viruses and Worms a CEHv Module 18 Cryptography J Advance Enaypbon Package sppprn.m i Sample File.docx t> M H A 4h(JAk > M O5 Calculator New folder E: [_ Encrypt SFX Delete O Encryption |
-rmm
Decrypt
8 8 8 8 8 8 0 1 1 3 ]
L Z IP 1 6
( 6 of 16) E-
Again:
1
Riddle:
2*
128*it key
v|
P Delete after enaypbon Securely delete Files Fiter r Show all files ( Apply filter... Apply Set Output Folder ( Current folder
o r ig in a l t ile , a s s h o w n 1 1 1 t h e f o ll o w i n g
File E M a il O p tio n s T o o ls H e lp
.C: t> > > t> >
a
CEH-Tools CEHv Module 02 Footprntmg and Recormarssance CBtv Module 03 Scamrxj Networks ,. CEHv Module 04 Enumeration j . CEHv Modiie 05 System Hacking J. C&tv Module 07 Viruses and Worms j . CEHv Module 18 Cryptography a J . Advance Encryption Package aeppro.msi g!* I Sample File.docx | 3 Sample File.doot.aep| > J HashCalc M D5 Calculator , New folder
8 8 8 8 8 8 0
Encryption
Mode: Password
EE
PQ: C Riddle:
>J.
Algorithm: D ESX
128bit key
I- Pack fie, then crypt Source Files P Delete after encryption f Securely delete Files Filter r Show all files Set Output Folder ( Current folder
Q
Apply Logg^g: D D:\CEH-T ls\CEHv Module 18 CryptographyVVdvance Encryption Packaged Sample Fie.docx [18 K B ] -> Sample F4e.docx.aep [18 K B ] 0 Done. Processed 1files. Succeeded: 1. Failed: 0 0 Processed 18 K B . Average speed: 18 KB/s
0 0
^ |
a
v I
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
D ecrypt;
it w ill
p r o m p t y o u to 10. C lic k
D ecrypt Now!.
rc
Advanced Encryption
J4 ,. ,. JA ^ m
I t creates encrypted
CEH-Tods CEHv Module 02 Footpnntmg and Recomassance CEHv Module 03 Scamng Networks CEHv Module 04 Enumeration CEHv Module 05 System Hadang C&tv Module 07 Viruses and Worms CBtv Module 18 Cryptography a ,. Advance Encryption Package $ aeppro.msi .*T! Sample File.docx |<3 Sample File.docx.aep |
8 8 8 8 8 8
**
Delete O
I I
|
ZIP E-mai
Mode: Password
Password:
....1
Source fite(s): ( Leave it alone r Delete
>^ H a sh C a k
Q D :V CEH -T ls'CEHv Module 18 CryptographyWivance Encryption PackageV Sample Ne.docx [18 K B ] -> Sample He.docx.aep [18KB] 0 Done. Processed 1 files. Succeeded: 1. Faled: 0 0 Processed 18 K B . Average speed: 18 KB/s
0 0
Lab Analysis
A n a l y z e a n d d o c u m e n t d i e r e s u lt s r e la t e d t o t l i e la b e x e r c is e .
P L E A S E
T A L K
T O
Y O U R
I N S T R U C T O R T O T H I S
I F
Y O U L A B .
H A V E
Q U E S T I O N S
R E L A T E D
T o o l/U tility
I n f o r m
a tio n
C o lle c te d /O b je c tiv e s
A c h ie v e d
A d v a n c e E n c r y p t io n O u tp u t: E n c ry p te d s im p le F ile . d o c x . a p e
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
P a cka g e
Questions
1. W h ic h a lg o r it h m d o e s A d v a n c e d E n c r y p t io n P a cka g e use to p ro te c t s e n s itiv e d o c u m e n ts ? 2. Is th e r e a n y o t h e r w a y t o p r o t e c t th e u s e o f p r iv a t e k e y t ile w i t h p a s s w o rd ? a
I n te r n e t
C o n n e c tio n
R e q u ir e d
Y e s S u p p o rte d
N o
P la tfo r m
!L a b s
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
B a s ic
D a ta
E n c r y p tin g
U s in g
T r u e C r y p t
Tru eCrypt is a s o f t w a r es y s t e mfor e s t a b lis h in ga n dm a in ta in in ga no n t h e fly e n c r y p t e dv o lu m e (d ata s t o r a g ed e v ic e ). O n th e fly e n c r y p t io nm e a n sthat d a ta is a u to m a tic a llye n a y p te do rd e c r y p t e drightb e f o r eit is lo a d e do rs a v e d , nithouta n y u s e rin t e r v e n t io n .
I CON KEY
/ V a lu a b le in f o r m a t i o n
Lab Scenario
C iT x d a ta is a b illio n - d o lla r c o m p a n y
0 11
and
d o e s n o t w a n t to la p to p s
ta k e
chances
0 1 r is k
th e
s to re d
it s
la p to p s . d a ta , and
These
c o n ta in
p r o p r ie t a r y
p a rtn e r its fu ll
>>
Test your k n o w le d g e
in fo r m a tio n , d a ta d is k to
c u s to m e r
f in a n c ia l in f o r m a t io n . C iT x
C iT x
c a n n o t a ffo rd s ta rte d d is k u s in g
b e lo s t t o
a n y o f it s to
0 11
c o m p e t it o r s . T h e its d a ta fro m
C o m p a n y eyes. and F u ll th e
W e b e x e r c is e
e n c r y p t io n a ll d a ta
p ro te c t
p r e y in g
e n c r y p t io n s y s te m .
e n c ry p ts
W o r k b o o k r e v ie w
a s y s te m , in c lu d in g
f ile s , f o ld e r s
o p e r a t in g
T i n s is m o s t a p p r o p r i a t e w h e n t h e p h y s i c a l s e c u r i t y o f t h e s y s t e m E n c r y p t io n uses one
0 1 m o re
is n o t a s s u r e d . d e c ry p t th e
c r y p to g r a p h ic
keys
to
e n c ry p t
and
d a ta th a t th e y p r o te c t.
Lab Objectives
T h i s la b w i l l g iv e y o u e x p e r ie n c e 0 1 1 e n c r y p t in g d a t a a n d s h o w y o u h o w I t w ill te a c h y o u h o w to : t o d o it .
Lab Environment
T o c a r r y o u t t h e la b , y o u n e e d :
T rueC rypt l o c a t e d a t D:\CEH-T00ls\CEHv 8 M odule 19 C ryptography\D isk E ncryption Tools\T rueC rypt
Y o u c a n a ls o d o w n lo a d t h e la te s t v e r s io n o f
T rueC rypt
fro m
th e lin k
h t t p : / / w w w .t r u e c r v p t . o r g / d o w n lo a d s
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
I f y o u d e c id e t o
1 1 1 t h e la b
d o w n lo a d d ie
la te s t v ersio n ,
d ie n s c r e e n s h o ts s h o w n
m ig h t d iff e r
F oU ow
th e
in s tr u c t io n s
R u n t in s t o o l 11 1
A d m in is t r a t iv e p r iv ile g e s t o
Lab Duration
T im e : 1 0 ]M in u te s
Overview of TrueCrypt
TrueCrypt
is a s o f t w a r e a p p l i c a t i o n u s e d f o r o n - d i e - f l y e n c r y p t i o n ( O T F E ) . I t i s d i s t r i b u t e d w i t h o u t c o s t , a n d d i e s o u r c e c o d e is a v a ila b le . I t c a n c r e a t e a
virtual
w i d i u i a t ile o r e n c r y p t a p a r t it io n o r a n e n t ir e s to r a g e d e v ic e .
TASK 1
Lab Tasks
1. L a u n c h th e
C reate a Volume
S ta rt
m e n u b y h o v e r in g th e m o u s e c u r s o r o n th e lo w e r - le lt
c o r n e r o f th e d e s k to p .
T rueC rypt
a p p to
o p e n th e
T rueC rypt
w in d o w .
Y o u can also
T rueC rypt
m a in w in d o w
a p p e a rs .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
4.
S e le c t t h e d e s ir e d v o l u m e
to
b e e n c r y p te d a n d c lic k
C re a te Volume.
Volumes
m
TrueCrypt
System
Volume
Favorites
Tools
Settings
Help
Size Encryption algorithm
Homepage
Typ e
a
T ru e C ry p t is a
softw are app lica tion used f o r o n -th e -fly e ncryption (O T F E ). I t is distrib u te d w ith o u t cost and die source code is available.
Drive
e : ^TT
Volume Properties...
Wipe Cache
T ru e C ry p t have die
a b ility to create and ru n a h idden encrypted operating system w hose existence m ay be denied.
Auto-Mount Devices
Dismount All
Exit
T h e
w in d o w
a p p e a rs . T h is
6.
m
IM P O R T A N T : N o te
S e l e c t the C re a te an e n c ry p te d file c o n ta in e r option. creates a virUial encrypted disk w ithin a tile. B y d e fa u lt, th e C lic k
opdon
th a t T ru e C ry p t w ill n o t encrypt any existing files (w hen creating a T ru e C ry p t file container). I f y o u select an existing file in d iis step, i t w ill be o v e rw ritte n and replaced b y the new ly created vo lu m e (so the o v e rw ritte n file w ill be lost, n o t encrypted). Y o u w ill be able to encrypt existing files (later on) b y m o v in g d ie m to the T ru e C ry p t vo lu m e th a t we are creating now .
C re a te an e n c ry p te d file c o n ta in e r
o p t i o n is s e le c te d .
N ext
to p ro c e e d .
Help
< Back
Next >
Cancel
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
8.
9.
11 1 th e
n e x t s te p o f th e w iz a r d , c h o o s e th e
ty p e o f v o lu m e .
S e le c t
th is c re a te s a
norm al
T ru e C ry p t
v o lu m e . 10. C lic k to p ro c e e d .
rzz------------------------------------------------------------------- 1 1^
TrueCrypt Volume Creation Wizard
Volume Type
| Standard TrueCrypt volume | N o te : A fte r you co p y existing unencrypted files to a T ru e C ryp t volum e , yo u should securely erase (,wipe) the o rig in a l unencrypted files. T he re are softw are tools th a t can be used f o r the purpose o f secure erasure (m any o f them are free). More information about hidden volumes Select this option if you want to create a normal TrueCrypt volume.
Hidden TrueCrypt volume It may happen that you are forced by somebody to reveal the password to an encrypted volume. There are many situations where you cannot reflise to reveal the password (for example, due to extortion). Using a so-called hidden volume allows you to solve such situations without revealing the password to your volume.
< Back
V olum e Location.
S e le c t File...,
TrueCrypt Volume Creation Wizard
Volume Location
[ * Never save history A TrueCrypt volume can reside in a file (called TrueCrypt container), which can reside on a hard disk, on a USB flash drive, etc. A TrueCrypt container is just like any normal file Ot can be, for example, moved or deleted as any normal file). Click ,Select File' to choose a filename for the container and to select the location where you wish the container to be created. WARNING: I f you select an existing file, TrueCrypt will NOT encrypt it; the file w i be deleted and replaced with the newly created TrueCrypt container. You will be able to encrypt existing files (later on) by moving them to the TrueCrypt container that you are about to create now.
T ru e C ry p t supports a
Help
< Back
Next >
Cancel
C reation W izard
1 4 . S e le c t a d e s ir e d
w in d o w
r e m a in s o p e n 1 1 1 t h e b a c k g r o u n d . p r o v id e a
lo cation ;
File nam e
ancl
it .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
Search Documents
Date m odified 8/8/2012 2:22 PM 8/7/2012 11:42 PM 8/9/2012 5:40 PM 9/4/2012 2:58 PM
t>
T h e m ode o f
t %
MyVolum e
Hide Folders
V olum e L ocation
w iz a r d
c o n tin u e s . C lic k
N ext
Volume Location
[ C:VJsefs\Administrat0 r p 0 QjmentsV>1 yV0 j Select File. I
T ru e C ry p t volum es
A TrueCrypt volume can reside in a file (called TrueCrypt container), which can reside on a hard disk, on a USB flash drive, etc. A TrueCrypt container is just like any normal file (it can be, for example, moved or deleted as any normal file). Click 'Select File' to choose a filename for the container and to select the location where you wish the container to be created. WARNING: I f you select an existing file, TrueCrypt will NOT encrypt it; the file will be deleted and replaced with the newly created TrueCrypt container. You will be able to encrypt existing files (later on) by moving them to the TrueCrypt container that you are about to create now.
Help
< Back
Next >
Cancel
a p p e a r 111 th e w iz a r d . and
a n d c lic k
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
Encryption Options
m
T ru e C ry p t curre ntly Test FlPS-approved cipher (Rjjndael, published in 1998) that may be used by U.S. government departments and agencies to protect classified information up to the Top Secret level. 256-bit key, 128-bit block, 14 rounds (AES-256). Mode of operation is XTS. More information on AES Benchmark I
V olum e Size
o p t io n
a p p e a rs . b e 2 m e g a b y te a n d c lic k
1 9 . S p e c if ) * t h e s iz e o f t h e T r u e C r y p t c o n t a i n e r t o
Next.
Volume Size
C kb
<* MB
GB
V olum e P a ssw o rd
o p t io n
a p p e a r s . T h i s is o n e
o f th e m o s t
im p o r t a n t s te p s . R e a d th e in f o r m a t io n
d is p la y e d 1 1 1 t h e w i z a r d w i n d o w
o n w h a t is c o n s id e r e d a g o o d p a s s w o r d c a r e f u ll y . 2 1 . P r o v id e a g o o d p a s s w o r d 11 1 th e f ir s t in p u t f ie ld , r e - ty p e i t 11 1 th e f ie ld , a n d c lic k
Confirm
Next.
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
|- |
Volume Password
Password: Confirm: | r Usekeyfiles
Keyfiles...
------------*
V~ Display password
T h e lo nger yo u m ove
the mouse, the better. T his s ig nifican tly increases the c r y p to g r a p h ic s t r e n g t h o f the en cryp tio n keys.
It is very important that you choose a good password. You should avoid choosing one that contains only a single word that can be found in a dictionary (or a combination o f 2, 3, or 4 such words). It should not contain any names or dates of birth. It should not be easy to guess. A good password is a random combination of upper and lower case letters, numbers, and special characters, such as @ A = $ * + etc. We recommend choosing a password consisting o f more than 20 characters (the longer, the better). The maximum possible length is 64 characters.
Help
< Back
Next >
Cancel
c lu s te r t o
V olum e F o rm at o p t i o n D efault.
a p p e a r s . S e le c t
a n d set
2 3 . M o v e y o u r m o u s e as r a n d o m ly as p o s s ib le w i t h i n W iz a r d w in d o w 24. C lic k a t le a s t t o r 3 0 s e c o n d s .
th e
V olum e C reatio n
Form at.
TrueC rypt V o lum e C reatio n W izard | |
" [3
Volume Format
Options Cluster |Default ] 1 Dynamic Filesystem
T ru e C ry p t volum es
have n o "signature" o r I D strings. U n til decrypted, they appear to consist solely o f ra ndom data.
Done
Speed
Left
IMPORTANT: Move your mouse as randomly as possible within this window. The longer you move it, the better. This significantly increases the cryptographic strength o f the encryption keys. Then dick Format to create the volume.
< Back
Format
Cancel
c a lle d
F orm at v o l u m e MyVolume
c r e a t io n b e g m s . T r u e C r y p t w i l l n o w
111 th e
p r o v id e d
f o ld e r . T in s
f ile
depends
o n th e T r u e C r y p t c o n ta in e r ( it w ill c o n ta in v o lu m e ) . 2 6 . D e p e n d in g o n
th e e n c ry p te d T r u e C r y p t
t h e s iz e o f t h e v o l u m e , t h e v o l u m e c r e a t i o n m a y t a k e a f o ll o w i n g d ia lo g b o x a p p e a r s .
lo n g t im e . A f t e r i t f in is h e s , t h e
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
OK
OK
to
c lo s e t h e d ia lo g b o x . ( file c o n ta in e r ) .
28. Y o u
h a v e s u c c e s s f u lly c r e a t e d a T r u e C r y p t v o lu m e
2 9 . 111 t h e
w iz a r d w in d o w , c lic k
Exit. _ x
Volume Created
1y=! T ru e C ry p t is unable to secure data o n a c o m p u te r i f an attacker physically accessed it and T ru e C ry p t is used o n the com prom ised co m puter by the user again.
The TrueCrypt volume has been created and is ready for use. I f you wish to create another TrueCrypt volume, dick Next. Otherwise, dick Exit.
[II
1^1
Help < Back F IG U R E 4.14: T ru e C ry p t V o lu m e C reation W iz a rd -V o lu m e Created 30. T o m o u n t a v o lu m e , la u n c h o f
TrueC rypt.
c lic k
Mount a Volume
3 1 . 111 t h e m a i n w i n d o w
TrueC rypt.
S e le c t File...
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
TrueCrypt
Settings Help H om epage
M o u n t op tio n s affect
the param eters o f the vo lu m e being m ounted. T ire M o u n t O p tio n s dialog can be opened by clickin g o n the M o u n t O p tio n s b u tto n in tlie passw ord en try dialog.
Create Volume
Wipe Cache
Auto-Mount Devices
Dismount All
3 3 . 111 t h e t i l e
s e le c to r , b r o w s e t o
Open.
B
(^ 1 ) ( 1* > ) '7
* Libraries Documents
C | | Search Documents
Organize
New folder
Name Date modified 8/8/2012 2:22 PM 8/7/2012 11:42 PM 8/9/2012 5:40 PM 9/4/2012 2:58 PM 9/25/2012 3:02 PM Type
S E E
Hyper-V
File folder File folder File folder File folder File
^1
Size
* " if Favorites
U i D e fa u lt m o u n t op tio n s can be config ure d in the m ain program preferences (Settings ) Preferences). Desktop J (. Downloa ^ Recent p
J t Snagit
1 . SQL Server Management Studio
J* Music *
> t> B >3 Libraries ( j Documei Music Pictures Videos
* ;P Computer
I L Local Dis '
TrueC rypt
w in d o w .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
3 5 . 111 t h e m a i n
T rueC rypt
w in d o w , c lic k
Mount.
TrueC rypt
Settings Help H om epage
Drive <*G:
Volume
Size
Encryption algorithm
Type
/s
-- L
T h is o p tio n can be
>-P
set in the passw ord entry dialog so d ia t it w ill apply o n ly to th a t p articular m o u n t attem pt. I t can also be set as default in the Preferences.
'-*Q
N *S s^T
Volume Properties...
Wipe Cache
Select Device...
Auto-Mount Devices
Dismount All
P a ssw o rd p rom pt
th e p a s s w o rd
d ia lo g w in d o w
a p p e a rs . th e
W h e n a corre ct
passw ord is cached, volum es are autom atically m o u n te d after you clic k M o u n t. I f yo u need to change m o u n t o ptio ns f o r a vo lu m e being m ounted using a cached password, h o ld d o w n d ie C o n tro l (C trl) key w h ile clicking M o u n t, o r select M o u n t w ith O p tio n s fro m the V o lu m e s menu.
37. T yp e
( w h ic h y o u s p e c if ie d e a r lie r f o r t in s v o lu m e ) i n a n d c lic k
P a ssw o rd
in p u t f ie ld
OK.
OK Cancel
v e r if ie d , T r u e C r y p t w i ll m o u n t th e v o lu m e .
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
N o data stored o n an
encrypted vo lu m e can be read (decrypted) w ith o u t using the corre ct password o r corre ct e n cryp tio n key.
4 0 . T h e v i r t u a l d i s k is e n t i r e l y e n c r y p t e d
ta b le s , t r e e s p a c e , e tc .) a n d b e h a v e s li k e a r e a l d is k . 41. Y o u c a n s a v e ( o r c o p y , m o v e , e tc .) t ile s t o t in s v ir m a l d is k a n d t h e y w i l l
D ism ount.
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
TrueCrypt
Settings Help
1
Size I Encryption algorithm
-i r
H om epage
Drive I Volume
-Hi
Type
I: *K
W M
^N +*0 s*P
s*.Q
*S
U 5 UJ T ru e C ry p t cannot autom atically d ism o u n t all m o unted T ru e C ry p t volum es o n system sh u td o w n /re sta rt. Create Volume Volume 1C:VJsers\Administrator documents V^lyVolume I? Never save history Volume Tools.. _ Select File... j . Select Device... Volume Properties... | Wipe Cache
^T
Auto-Mount Devices
Dismount All
Lab Analysis
A n a l y z e a n d d o c u m e n t d i e r e s u lt s r e la t e d t o d i e la b e x e r c is e .
P L E A S E
T A L K
T O
Y O U R
I N S T R U C T O R T O T H I S
I F
Y O U L A B .
H A V E
Q U E S T I O N S
R E L A T E D
T o o l/ U t ility
In fo r m a tio n E n c ry p te d
C o lle c te d /O b je c t iv e s
A c h ie v e d
V o lu m e : I
T ru e C ry p t V o lu m e F ile S y s te m : F A T
Questions
1. D e t e r m in e w h e t h e r t h e r e is a n y w a y t o re c o v e r th e f ile s f r o m th e T r u e C r y p t v o lu m e i f y o u fo r g e t th e v o lu m e p a s s w o rd . 2. E v a lu a t e w h e t h e r T r u e C r y p t u s e s a n y t r u s t e d p r o g r a m ( T P M ) to p r e v e n t a tta c k s . I f y e s , h n d m o d u le
o u t th e r e le v a n t T P M .
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
In te rn e t C onnectio n R equired
Yes 0 No
P la tfo rm Supported
0 Classroom
0 !L abs
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Lab
B a s ic
D a ta
E n c r y p t in g
U s in g
C ry p T o o l
CiypTool is a freeware program that enables yon to apply and anajy-^e cryptographic mechanisms. It has the typical look andfeel of a modern Windows application. CrypTool includes every state-of-the-art cryptographic function and allows yon to learn and use cryptography within the same environment.
I CON KEY /Valuable information > > Test your know ledge
L a b S c e n a r io
Web exercise
m Workbook review
M ost security initiatives are defensive strategies aim ed at protecting the perim eter of the netw ork. B ut these efforts m ay ignore a crucial vulnerability: sensitive data stored 0 11 networked servers is at risk from attackers who only need to find one w ayinside the netw ork to access this confidential inform ation. A dditionally, perim eter defenses like firew alls cannot protect stored sensitive data fromthe internal threat of em ployees w ith the m eans to access and exploit this data. Encryption can provide strong security for sensitive data stored 0 11 local or netw ork servers. 111 order to be an expert ethical hacker and penetration tester, you m ust have know ledge of cryptography functions.
L a b O b je c t iv e s
This labw ill give you experience 0 11 encryptingdata and showyou howto do it. It w ill teach you howto: & Tools U se encrypting/decrypting com m ands dem onstrated in V isualize several algorithm s this lab are available in C alculate hashvalues and analysis D :\C E H T ools\C E H v8 L a b E n v ir o n m e n t M odule 19 C ryptography To carryout the lab, you need: C rypT ool located at D :\C E H -T 0 0ls\C E H v8M odule 19 Cryptography\Cryptanalysis Tools\C rypTool
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
C r y p T o o li saf r e e e l e a m i n ga p p l i c a t i o nf o r W i n d o w s .
ca
Y ou can also dow nload the latest version of C rypT ool fromthe link http:/ /w w w .cn~ptool.org/en/download-ctl -en If you decide to dow nload the latest version, then screenshots show n 111 the lab m ight differ Followthe w izard-driven installation instructions R un tliis tool 0 11 W indow s Server 2012 host m achine A dm inistrative privileges to nin the tool
L a b D u r a t io n
T im e: 1 0M inutes
O v e r v ie w o f C r y p T o o l
C rypT ool is atree, open-source e-leam ing application used111theim plem entation andanalysis ot cryptographic algorithm s. It w as onguiallydesignedfor internal business application for inform ationsecuritytraining.
TAS K 1
Lab Tasks
1 . Launch the Start m enu byhovering the m ouse cursor 0 11 the low er-left corner of the desktop.
: | Windows Server 2 0 12
W if Y f e x v s S e rv e rX )VB e lc a c aC a r d id a t eD a t a c e n t e f c w u a r jo ic o p y .M O5 4 *
I .
FIGURE 5 . 1 : W i n d o w sS e r v e r2 0 1 2 D e s k t o pv i e w
m You c a na l s o d o w n l o a dC r y p T o o lf r o m h t t p : / / w w w . c r y p t o o l . o r g
Google Chrome
Hyper-V Manager
CrypTool
C l
t Command Prompt FT 3
Workspace Studio
FIGURE 5 . 2 :W i ndowsS e r v e r2 0 1 2A p p s
C E H Lab Manual Page 946 Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
3. The H owto Start dialog box appears. C heck D ont showthis dialog again and click C lose.
How to Start
16 41 F6 4F
CrypTool is a free e-learning program, designed to demonstrate the application and analysis of encryption algorithms. CrypTool includes an extensive online help database. Context-sensitive information can be accessed by pressing the F1 key while selecting any menu item or viewing any dialog box. If you press the F1 key now. the online help vill present an introduction to CrypTool Have fun!
6 8 6
FB A BB
4K B 1 4F 2C
Close
m C r y p T o o lO n l i n e p r o v i d e sa ne x c i t i n gi n s i g h t i n t ot h ew o r l do f c r y p t o l o g yw i t hav a r i e t y o fc i p h e r sa n de n c r y p t i o n m e d i o d s .
4. The m amw indowot C rypT ool appears, as show nin die follow ing figure. C lose die startingexample-en.txt w indowin C rypT ool.
CrypTool 1.4.31 Beta 5 [VS2010] - startingexample-en.txt
File Edit View Enjrypt/Decrypt Digital Signatures/PKI Jndiv. Procedures Analysis Qptions Window Help
p|cg|tflHiai x i la l * M
W l
FIGURE 5 . 4 :s t a r t i n g e x a m p l e e n . t x twindowi nC r y p T o o l
5 . To encrypt die desired data, clickthe File option and select N ewfrom die m enu bar.
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
0
File 1 Edit N ew Open... Close Save Save as... D ocum ent Properties... Print... Print Setup... Recent Files Exit Alt+F4 Ctrl P View Encrypt/Decrypt Ctrl+N Ctrl 0 Ctrl+F4 Ctrl+S
\-\T
W in d o w Help
f|?|
1 l L I
FIGURE 5 . 5 :C r y p T o o lM a i nWindow 0 = 5 !C r y p T o o lw a s o r i g i n a l l yd e s i g n e df o r i n t e r n a lb u s i n e s s a p p l i c a t i o nf o ri n f o r m a t i o n s e c u r i t y .
6 . Type a fewlines 111 the opened Unnam edl Notepad of C rypT ool. 7. On the m enu bar, select Encrypt/D ecrypt. Sym m etric (m odern), and select anyencryptingalgorithm . 8 . Select the R C 2 encryptingalgorithm .
CrypTool 1.4.31 Beta 5 [VS2010] U nnam edl
File Edit View ^ n c r y p ^ D e c r y p ^ Digital Signatu es/PKI Sym m etric (classic) Sym m etric (m odem ) Asym m etric Hybrid RC2... RC4... DES (ECB)... DES (C B Q ... Triple DES (ECB)... Triple DES (CBC)... Rijndael (AES)... Further Algorithm s A ES (self extracting)... Shift + Strg + R Indiv. Procedures Analysis Options W in d o w Help
Dlar fU
The CrypTool portal is a centralized place forj project- The CrypTool project develops the w < programs in the area of cryptography and cry
NUM
FIGURE 5 . 6 :S e l e c tt h eRC2 E n c r y p ta l g o r i t h m
9 . 1 1 1the K ey E ntry: R C 2w izard, select K ey length fromthe dropdow n list 1 0 . Enter the keyusinghexadecim al characters and click Encrypt.
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
Encrypt
Decrypt
Cancel
FIGURE 5 . 7 :S e l e c t i n gKeyL e n g t hi nt h eh e x a d e c i m a lc h a r a c t e r
1 1 .R C 2 encryption of U nnam ed1notepad w ill appear as show n 111 the follow ing figure.
RC2 encryption of <Unnamed1>, key <00>
m C r y p T o o li n c l u d e s e v e r ys t a t e o f t h e a r t c r y p t o g r a p h i cf u n c t i o na n d a l l o w sy o ut ol e a ma n du s e c r y p t o g r a p h y w i t h i nd i es a m e e n v i r o n m e n t .
0 0
.U O # . . . r .g.. ten .1=.#.6(C m /. ...K U ...q H F . k O A ..*+ B U ..C .b.........l.k.q ..x W K 8 z ..z .+.X P _ _ _ ....U Z ... . x. * b $ 0 @ I. .0._[..w .v A N . . r . : .0 j. . . . * k-<..n. ] . .. . 9 1 rl
0 0 0 0 0 0 0 0 0000000c 0 0 0 0 0 0 1 8 0 0 0 0 0 0 2 4 0 0 0 0 0 0 3 0 0 0 0 0 0 0 3 C 0 0 0 0 0 0 4 8 0 0 0 0 0 0 5 4 0 0 0 0 0 0 6 0 0 0 0 0 0 0 6 C 0 0 0 0 0 0 7 8 0 0 0 0 0 0 8 4 0 0 0 0 0 0 9 0 0 0 0 0 0 0 9 C n n n n n ru fi
4 7 2 E 4 6 7 D 4 IB E C5 5 4 F 2 3 1 6 IB A A9 D FI 2 4 El C EA 7 4 0 7 3 6 E0 9 A 2 3 A D4 9 3 DB 7 2 3 B 5 3 6 2 8 4 3 6 D2 FB C 7 E 1 4 8 4 6 E 3 9 BC 8C 9 4 B5 7 8 2 9 6 7 2 5 7 C C0 9 4 3 6 B4 F4 1 1 2 A E2 A2 B4 1 2 F B9 CE 4 A 4C 2 6 C9 8 6 B0 B7 D D6 7 9 9 6 9 8 7 8 5 7 4 BA 6 E 6 B 9 9 4 3 8 7 A 0 9 4 8 CF 4 B EA 9 7 AC E2 B8 1 5 8 5 0 A A5 7 5 A IB B 2 8 8 E C7 8 A l D AE 6 8 BD 2 A9 7 B AD AD 6B 2 6 2 2 4 4 F4 0 4 9 F C 7 B 1 4 E F 3 3 0 0 2 5 F5 B0 3 8 B7 9 7 6 4 AB BF 8 E 4 0 8 9 6 0 A7 2 8 1 3 AC 7 3 0 6 C 8 0 0 F 0 8 BE AB 9 8 4C 8B D2 AF B9 D F 6 B2 D3 C9 1 B 9 6 ED D5 D ID F 8 C 3 D 4 F 9 1 7 3 9 5 1 F3 7 ? ? 9 a n F 9 8
FIGURE 5 . 8 :O u t p u to fRC2 e n c r y p t e dd a t a L a b A n a ly s is
Tool/Utility CrypTool
Information Collected/Objectives Achieved Encrypted Algorithm :R C 2 Result: Encrypted data for selected text
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Q u e s t io n s
1 . W liat are the alternatives to C rvpTool for encrypting data? 2. H owcanyou differentiate betw een encrypting data 111 CrypTool and other encrypting tools? Internet Connection Required Y es Platform Supported 0 Classroom
0 No 0 1L abs
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
E n c r y p t in g U s in g
a n d
D e c r y p t in g
D a ta
B C T e x tE n c o d e r
B C TextE 11 code/* simplifies encoding and decoding text data. Plaintext data is compressed, encrypted, and convetted to text format, which can then he easily copied to the clipboard or saved as a textfile.
I CON KEY [ Z 7Valuable information Test your know ledge
L a b S c e n a r io
111 order to be an expert ethical hacker and penetration tester you m ust
have know ledge of cryptography functions.
L a b O b je c t iv e s
Web ex ercise
m Workbook review
Tins labw ill give you experience 0 11 encryptingdata and showyou howto do it. It w ill teach you howto: U se encode/decode text data encryptedw ith apassw ord
L a b E n v ir o n m e n t
& Tools dem onstrated in this lab are available in D :\C E H T ools\C E H v8 M odule 19 C ryptography
To carryout the lab, you need: BCTextEncoder located at D :\C E H -T 0 0ls\C E H v8M odule 19 Cryptography\Cryptography Tools\BCTextEncoder Y ou can also dow nload the latest version of BCTextEncoder fromthe link http://www.jet1c0.com/e11ciT pt10 11-bctexte11c0 der/ If vou decide to dow nload the latest version, then screenshots show n 111 the lab m ight differ Run tins tool 0 11 W indow s Server 2012 host m achine A dm inistrative privileges to run the tool
L a b D u r a t io n
T une: 1 0M inutes
C E H Lab Manual Page 951 Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
O v e r v ie w o f B C T e x t E n c o d e r
B C TextEncoder uses public keyencryption m ethods asw ell aspassw ord-based encryption. T ins utilitysoftw areuses strongandapprovedsym m etric andpublic keyalgonthm s for data encryption.
a T s 1 Lab T asks
1 . D ouble-click the BCTextEncoder.exe file. The m ainw indowof BCTextEncoder appears, as displayed111 the follow ing figure.
B C T e x tE n c o d e rU tilityv .1 .0 0 .6
File Edit Key Options Help
L I -
[3 0
Decoded plain text:
s ? ?
Encode by: password vI
Encode
m You c a na l s o d o w n l o a dB C T e x t E n c o d e r f r o m h t t p : / / w w w . j e t i c o . c o m
V Encoded text:
[_ Decode
] A
FIGURE6 . 1 :M a i nw i n d o wo fB C T e x t E n c o d e r
2 . To encrypt the text, type die text 111 C lipboard (O R ) select the secret data and put it to clipboardw ith C trl+ V .
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
m B C T e x t E n c o d e r u t i l i z e st h ef o l l o w i n g e n c r y p t i o na l g o r i t h m s :
3. C lick Encode. The Enter Password w indoww ill appear. Set the passw ord and confirmthe sam e passw ord 111 the respective fields. 4 . C lick O K .
B C T e x tE n c o d e rU tilityv .1 .0 0 .6
File Edit Key Options Help
Encode by:
password
E n te rp a s s w o rd
Session key algorithm AES-256 Password: Cancel
FIGURE 6 . 3 :S e td i ep a s s w o r df o re n c r y p t i o n
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
1 1
Encode by:
password
v|
Encode
| A
m T l i em a i na d v a n t a g e o fB C T e x t E n c o d e ri s s u p p o r to fp u b l i ck e y e n c r y p t i o n .
V Encoded text: 664 B - BEGIN ENCODED MESSAGEVersion: BCTextEncoder Utility v. 1.00.6 wy4ECQMCDgigsNHLCPBgULNwLKVwVmExFmiL/zkMcw9wj0hkL7w/dsw2sfC51pJ3 OnABN+yXn 12R9NYpU6NlvNRNFwV +S9hLNrkA6A3eBumfSyNE70qdguFmjYs8yhV0 b5b5-fblmROaUBQjcYNM5XqpnTi4pfbsspMtTMzQgXATaiEEcS8 MhEgyPqpdUrR5 pmeRQVEVQY0 8 GUbT+HiOyS40 - END ENCODED MESSAGE-
Decode A
FIGURE 6 . 4 :E n c o d e dt e x t
3 t as k 2 D ecryptingthe D ata
6 . To decrypt the data, you first clean the D ecoded plain text clipboard. 7. C lick the Decode button
FIGURE 6 . 5 :D e c o d i n gt h ed a t a
8 . The Enter password for encoding text w idoww ill appear. Enter the passw ord 111 the Password held, and click O K .
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
B C T e x tE n c o d e rU tilityv .1 .0 0 .6
File Edit Key Options Help
Encode by;
password
E n te rp a s s w o rdfo re n c o d in g te x t
Encoded text -Session key packet Password : Cancel
Encoded text: 664 B - BEGIN ENCODED MESSAGEVersion: BCTextEncoder Utility v. 1.00.6 wy4ECQMCDgigsNHLCPBgULNwLKVwVmExFmiL/zkMcw-9wj0hkL7w/dsw2sfC5JpJ3 OnABN+yXn 12R9NYpU6NlvNRNFwV+S9hLNrkA6A3eBumfSyNE70qdguFmjYs8yhVo b5b5-fbJmROaUBQjcYNM5XqpnTi4pfbsspMtTMzQgXATaiEEcS8 MhEgyPqpdL)rR5 pmeRQVEVQY0 8 GUbT+HiOyS+ 0 - END ENCODED MESSAGE-
Decode
FIGURE 6 . 6 :E n t e rt h ep a s s w o r df o rd e c o d i n g
B C T e x tE n c o d e rU tilityv .1 .0 0 .6
L T n
File
v|
|~ Encode / \
V Encoded text: 664 B -BEGIN ENCODED MESSAGEVersion: BCTextEncoder Utility v. 1.00.6 wy4 ECQMCDg1 gsNHLCPBgULNwLKVwVmExFm1 L/zkMcw9 wj0 hkL7w/dsw2sfC5Jp J3 OnABN+yXn12R9NYpU6NlvNRNFwV +S9hLNrkA6A3eBumfSyNE70qdguFmjYs8yhVo b5b5+bJmR0aUBQjcYNM5XqpnTi4pfbsspMtTMzQgXATaiEEcS8 MhEgyPqpdUrR5 pmeRQVEVQY08 GUbT-H -liO yS+ 0 - END ENCODED MESSAGEDecoded by password | Decode [7 ]
FIGURE 6 . 7 :O u t p u td e c o d e dt e x t L a b A n a ly s is
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Information Collected/Objectives Achieved Result: Encoding and D ecoding text for selected data
1 . H owcanyou differentiate betw een encryptingor decrypting the data in BCTextEncoder and other encrypting tools? Internet Connection Required Y es Platform Supported 0 Classroom
0 No
Ethical Hacking and Countenneasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Lab
B a s ic R o h o s
D a ta D is k
E n c r y p t in g E n c r y p t io n
U s in g
The Rohos D isk Encryption-program creates hidden andprotectedpartitions on the computer or U SB flash drive andpasswordprotects/locks access toyour Internet applications.
I CON KEY [ Z 7Valuable information Test your know ledge
L a b S c e n a r io
Web ex ercise
m Workbook review
Today's w eb brow sers autom atically encrypt text w hen m aking a connection to a secure server. This prevents intruders from listening in on private com m unications. Even if they are able to capture the m essage, encryption allow s them to only view scram bled text or w hat m any call unreadable gibberish. Upon arrival, the data is decrypted, allow ing the intended recipient to view the m essage 111 its original form . 111 order to be an expert ethical hacker and penetration tester, you m ust have know ledge of cryptography functions.
L a b O b je c t iv e s
Tins labw ill give you experience on encryptingdata and showyou howto do it. It w ill teachyou howto: U se encrypting/decrypting com m ands C reate aviruial encrypted diskw ith a file
L a b E n v ir o n m e n t
To carry out the lab, you need: & Tools Rohos D isk Encryption located at D :\C EH -Tools\C EH v8M odule19 dem onstrated in Cryptography\D isk Encryption Tools\Rohos D isk Encryption this labare Y ou can also dow nload the latest version of Rohos D isk Encryption available in from the link http: / /www.rohos.com /products /rohos-disk-encryption/ D :\C E H T ools\C E H v8 If you decide to dow nload the latest version, then screenshots show n M odule 19 111 the lab m ight differ C ryptography Followthe w izard-driven installation instructions
C E H Lab Manual Page 957 Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
R un diis tool 0 11 W indow s Server 2012 host m achine A dm inistrative privileges to run the tool
L a b D u r a t io n
T im e: 10M inutes
O v e r v ie w o f R o h o s D is k E n c r y p t io n
R olios D isk Encryption creates hidden and passw ord protected partitions 0 11 the com puter or U S Bflash drive w ith m egabytes of sensitive tiles and private data 0 11 your com puter or U S B drive. R ohos D isk uses N IST -approved A E S encryption algoridim , and 256 bit encryption keylength. Encryption is autom atic and on-thefly .
TAS K 1 Lab T asks
1 . To install R ohos D iskEncryption, navigate to D :\C E H -T 00ls\C E H v8 M odule 19 C ryptography\D isk Encryption Tools\Rohos D isk Encryption. 2 . D ouble-click the rohos.exe tile/ Select the language English and click O K .
Select Setup Language
S e le c t th e la n g u a g e to u s ed u rin g th e in s ta lla tio n :
E n g lis h
O K
C a n c e l
y=H Youc a na l s o d o w n l o a dR o h o sf r o m h t t p : / / w w w . r o h o s . c o m
FIGURE7 . 1 :S e l e c t d i eL a n g u a g e
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
s
P o r t a b l eR o h o sD i s k B r o w s e ra l l o w st ou s e e n c r y p t e dp a r t i t i o no na n y PC w i t h o u tAdminr i g h t s , w i t h o u ti n s t a l l .
m
This will install Rohos Disk 1.9 on your computer. It is recommended that you dose all other applications before continuing.
Cancel
FIGURE 7 . 2 :R o h o ss e t u pw i z a r d
4. The Licence Agreem ent w indoww ill appear. R ead the agreem ent carefullyand select the I accept the agreement radio button 5 . C lick N ext.
Setup - Rohos Disk Encryption
License A greem ent Please read the following important information before continuing.
Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.
a u t o m a t i ca n do n t h e f l y . AES 2 5 6b i tk e yl e n g t h . U s i n gNISTc o m p l i a n t e n c r y p t i o ns t a n d a r d s
ca Encryptioni s
Tesline-Service S.R.L. http://www.rohos.com/ License for use and distribution The Rohos Logon and Rohos Disk Encryption ('Rohos') are distributed as try-before-you-buy. This means: 1. All copyrights to Rohos are exclusively owned by the authors I accept the agreement
< Back
Cancel
FIGURE 7 . 3 :L i c e n s ea g r e e m e n twi nd o w
6 . C lick N ext.
Ethical Hacking and Countemieasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
File V irtualization: prevents secret data leak outside encrypted disk on T E M Pfolders, Registry, Recent documents list, etc.
m Anyf i l e o rf o l d e rc a n b ee a s i l y m o v e di n t o E n c r y p t e dR o h o sD i s kw i t h s h r e d d i n ga f t e r w a r d s .
FIGURE 7 . 5 :c r e a t i n gR o h o sd e s k t o pi c o n
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
Click Install to continue with the installation, or dick Back if you want to review or change any settings. Start Menu folder: Rohos Additional tasks: Additional icons: Create a desktop icon A
m S e c u r e dv i r m a l k e y b o a r d-p r o t e c t e n c r y p t e dd i s kp a s s w o r d f r o mak e y l o g g e r
V < l>
< Back
Install
Cancel
FIGURE 7 . 6 :R o h o sd i s ke n c r y p t i o ni n s t a l l a t i o n
9 . C lick Finish.
Setup - Rohos Disk Encryption
_
Setup has finished installing Rohos Disk Encryption on your computer. The application may be launched by selecting the installed icons. Click Finish to exit Setup. 0 Launch Rohos Disk
Finish
FIGURE 7 . 7 :C o m p l e t ei n s t a l l a t i o no fR o h o sd i s ke n c r y p t i o n TAS K 2
D iskEncryption
1 0 . The Rohos G et Ready W izardw indoww ill appear. Specifythe passw ord to access the disk111 the respective field. 11. C lick N ext. 12 .A lternatively, you can alsolaunch the programtromthe Start m enu apps ofW indow s Server 2012.
Ethical Hacking and Countenneasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
R o h o sG e tR e a d yW iz a rd
Step 1 of 3
D is kE n cryp tio n
This wizard helps you create your personal encrypted disk. You can use it to store sensitive files and folders. The disk will be protected by a password. The wizard has determined best parameters for the disk but you may change it using 'details' link. Encrypted Rohos disk size 5000 Megabytes, disk letter R :. Disk container path: D ocum ents\rdisk0.rdi. [Change...]
t e i s lR o h o sd i s ku s e s NISTa p p r o v e dAES e n c r y p t i o na l g o r i t h m ,2 5 6 b i te n c r y p t i o nk e yl e n g t h .
Press ,Next'.
E x it
N e x t>
FIGURE 7 . 8 :S e l e c tp a s s w o r df o ra c c e s sd i s k
1 3 . The Setup U S BK eyw indowappears. R ead the inform ation, and click N ext.
R o h o sG e tR e a d yW iz a rd
step 2 of 3
S e tu pU S BK e y
If you have a USB key, you can use it to access your Rohos disk, so you don't have to manually enter the password every time.
R o h o sc a r e sa b o u t u s a b i l i t y :Y o u rf i r s t E n c r y p t e dD r i v ec a nb e t u r n e do nw i t has i n g l e c l i c ko ra u t o m a t i c a l l yo n s y s t e ms t a r t u p .
ca
Plug it in and choose check boxes to setup USB Key. If you don't have a USB flash drive, dick ,Next'. Please insert you r USB device. Setup this USB device : To access your Rohos disk Learn more.. Press 'Next'. [Change...]
E x it
N e x t>
FIGURE 7 . 9 :S e l e c tUSB k e yd e v i c e
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.
M odule 19 - C ryptography
R o h o sG e tR e a d yW iz a rd
Finish
R o h o sU p d a te s
With Rohos Center you can check for updates over an Internet connection.You will have a chance to see what's new in Rohos and update size, and to download and install update instantly.
Inform ation: R ra 16.2g . J z? lall You may dose Rohos Center window and Rohos will continue to run in taskbar (near the dock).
P a r t i t i o np a s s w o r d r e s e to p t i o na l l o w sc r e a t i n g ab a c k u pf i l et oa c c e s sy o u r s e c u r e dd i s ki f y o uf o r g o t y o u rp a s s w o r do rl o s tUSB k e y .
Find and use Rohos disk icon through Save As/Open dialog within MS Office and others applications. It is strongly recommended to create a Password R eset File for Rohos disk \ to prevent forgotten password.
Exit
Finish
FIGURE 7 . 1 0 :R o h o sd i s ke n c r y p t i o nu p d a t ew i n do w
15 . The encrypted diskis created successfully, as show n 111 follow ing figure.
Rohos D isk Encryption
Roh
m T h i so p t i o nb r i n g s a f f o r d a b l ea n dAES2 5 6 s t r e n g t he n c r y p t i o ns o l u t i o n t oi m p r o v es e c u r i t y i s s u e sb y p r e v e n t i n g u n a u d i o r i z e d a c c e s st oy o u rI n t e r n e ta p p s , s u c ha sG o o g l eC h r o m e , F i r e f o x
l_ ( ) Disk i sconnected. Encrypted Disk (R:) I Size: 4.88 GB. Free space: 4.82 GB. Disconnect Browse Tools...
I Support
Q Help..
Hide folder
Hide and encrypt a particular folder from PC into Rohos Disk.
Options
Setup disk auto start, disconnect hotkeys and other options.
Change password
Specify new password to access Rohos disk.
Setup USB stick as a hardware key to access Rohos disk. Connect more... Create another one... Create Rohos Disk within media file Restore Rohos disk.
FIGURE 7 . 1 1 :S u c c e s s f u lc r e a t i o no fe n c r y p t e dd i s k
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
R o h o sD is kE n c ry p tio n
- 1 p m i
Support
Roh s
Disk is connected. Encrypted Disk (R:) Size; 4.88 GB. Free space: 4.82 GB. Disconnect | Browse Tools...
I w a n t t o ...
p*2!! Hide folder
i e> Hide and encrypt a particular folder from PC into Rohos Disk.
Options
Change password
Specify new password to access Rohos disk.
FIGURE 7 . 1 2 :D e c r y p tt h ed i s k
17 . Atter decrypting the disk, it w ill be displayed, as show n 111 the follow ing figure.
R o h o sD is kE n c ry p tio n
Roh^s
Primary Rohos disk is not connected. f t Connect disk
<3 Updates
Support
Q Help..
I w a n t t o ...
p a, Hide folder
L .(2) Hide and encrypt a particular folder from PC into Rohos Disk.
Options
Setup disk auto start, disconnect hotkeys and other options.
Change password
Specify new password to access Rohos disk.
FIGURE 7 . 1 3 :D e c r y p tt h ed i s k L a b A n a ly s is
Ethical Hacking and Countermeasures Copyright by EC-Council All Rights Reserved. Reproduction is Stricdy Prohibited.
M odule 19 - C ryptography
Tool/Utility
Rohos D isk Encryption
Q u e s t io n s
1 . D eterm ine whether there is anyw ayto recover the files fromRohos D iskEncryption if you forget the volum e passw ord. Internet Connection Required
Yes Platform Supported 0 Classroom
0 !Labs
No
Ethical Hacking and Countermeasures Copyright by EC-Council A ll Rights Reserved. Reproduction is Stricdy Prohibited.