🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page

Cryptography & stegnography

Cryptography is the practice of securing communication and information through the use of mathematical techniques, algorithms, and protocols to protect data from unauthorized access, tampering, or alteration. It is widely used to ensure confidentiality, integrity, authentication, and non-repudiation in digital systems. Here are the main principles of cryptography:

1. Confidentiality

Confidentiality ensures that only authorized parties can access the information. This is typically achieved by encrypting the data, meaning that the data is transformed into an unreadable format unless the recipient has the proper decryption key.

2. Integrity

Integrity ensures that the data has not been altered or tampered with during transmission or storage. Cryptographic methods like hashing are used to verify that the data is consistent with the original, ensuring no unauthorized modifications.

3. Authentication

Authentication verifies the identity of users, devices, or systems to ensure that they are who they claim to be. This is often achieved using digital signatures, certificates, or password-based methods.

4. Non-Repudiation

Non-repudiation ensures that a party cannot deny the authenticity of their actions, such as sending a message or making a transaction. This is commonly accomplished through digital signatures or logging mechanisms.

Key Concepts in Cryptography

  1. Encryption and Decryption:

    • Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable format) using an algorithm and a key.

    • Decryption is the process of converting ciphertext back into plaintext using a decryption key.

  2. Symmetric vs. Asymmetric Encryption:

    • Symmetric encryption uses the same key for both encryption and decryption. The key must be kept secret between the sender and receiver. Example: AES (Advanced Encryption Standard).

    • Asymmetric encryption uses a pair of keys—public and private. The public key is used for encryption, while the private key is used for decryption. This allows for secure communication without the need to share the secret key. Example: RSA (Rivest-Shamir-Adleman).

  3. Hashing:

    • Hashing is the process of converting data (like a message or file) into a fixed-length string of characters, typically a digest. This process is one-way, meaning you can't recover the original data from the hash. Hash functions like SHA (Secure Hash Algorithm) are used to ensure data integrity.

  4. Digital Signatures:

    • Digital signatures use asymmetric encryption to verify the authenticity and integrity of messages or documents. The sender "signs" the message with their private key, and the recipient can verify the signature using the sender’s public key.

  5. Public Key Infrastructure (PKI):

    • PKI is a framework used to manage digital keys and certificates. It enables secure communications by allowing users to verify each other’s identities using digital certificates issued by trusted Certificate Authorities (CAs).

  6. Cryptographic Protocols:

    • Cryptographic protocols are sets of rules and algorithms that govern secure communication. Examples include:

      • SSL/TLS for secure web browsing (HTTPS).

      • IPsec for secure internet protocol communication.

      • PGP (Pretty Good Privacy) for secure email communication.

The tools can used for cryptography is as follows :

Online Converters--------------------------------------------------
1.  Cyber chef : https://gchq.github.io/CyberChef/
2.  Cracking station : https://crackstation.net
-------------------------------------------------------------------

Disk Encryption software-------------------------------------------
1. Veracrypt : https://www.veracrypt.fr/code/VeraCrypt/
2. Rohos Disk Encryption
-------------------------------------------------------------------

Cryptanalysis Tools------------------------------------------------
1. Cryptool
2. Alphapeeler
-------------------------------------------------------------------

Hash Calculator ---------------------------------------------------
1. MD5 Calculator
2. HashCalc
3. HashMyFiles
-------------------------------------------------------------------

Cryptography tools ------------------------------------------------
1. Advanced Encryption Package
2. Cryptoforage
3. BC Text Encoder
PreviousLazyS3NextVeracrypt

Last updated 5 months ago