Skip to content

Commit 6547bd7

Browse files
committed
Update online recommendations
1 parent da9f6b2 commit 6547bd7

File tree

6 files changed

+9
-14
lines changed

6 files changed

+9
-14
lines changed

trainingportal/static/lessons/cryptoBreaker/crypto_caesar.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,9 @@ In this module you will learn about various ways in which information can be enc
55
To solve challenges you will need to execute various transformations on a block of given data.
66

77
There are several online resources that can help you in your journey.
8-
Here are a few recommendations:
9-
10-
- `dCode.fr` : includes a large variety of encoding, hashing and encryption tools
11-
- `criptii.com` : similar to `dCode.fr`
12-
- `crackstation.net` : includes a large dictionary of words and numbers hashed with several different algorithms
13-
- `hashes.net`: similar to `crackstation.net`
14-
15-
You may also use your programming/scripting language of choice.
8+
For example `dCode.fr` : includes a large variety of encoding, hashing and encryption tools.
9+
`hashes.com` includes a large collection of hashes.
10+
There are many online resources that you can use besides these sites. You may also use your programming/scripting language of choice.
1611

1712
**NOTE: If you decide to view the solution, open the solution as a new tab or window so you don't reset the cipher.**
1813

trainingportal/static/lessons/cryptoBreaker/crypto_hash.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Most algorithms leverage the characteristics of the data to arrive at a unique v
2828

2929
##### Weaknesses
3030

31-
Digests can be pre-calculated making them as easy to reverse as an ASCII code. Indeed websites like `dCode.fr`, `crackstation.net` or `hashes.com` contain large databases of pre-calculated digests also known as rainbow tables. The best way to prevent reversing hashed words is to concatenate a random string to the text. This is known as adding a salt. Another mitigation involves hashing the message several times (adding iterations). This increases the amount of computations necessary to calculate the hash.
31+
Digests can be pre-calculated making them as easy to reverse as an ASCII code. You can find public websites which contain large databases of pre-calculated digests also known as rainbow tables. The best way to prevent reversing hashed words is to concatenate a random string to the text. This is known as adding a salt. Another mitigation involves hashing the message several times (adding iterations). This increases the amount of computations necessary to calculate the hash.
3232

3333
Hashing algorithms are also vulnerable to collision attacks. Such attacks involve altering the input to arrive at the same digest. This is particularly dangerous when using hashing functions to ensure the integrity of executable files. Both MD5 and SHA1 algorithms are vulnerable to collision attacks.
3434

trainingportal/static/lessons/greenBelt/cwe327.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
</p>
1616
<p>
1717
Did you know that there are online sites like <a target="_blank" rel="noopener noreferrer" href="https://hashes.com/">Hashes.com</a> or
18-
<a target="_blank" rel="noopener noreferrer" href="https://crackstation.net/">CrackStation.net</a> that maintain a list of known hashes for numbers and dictionary words, also known as a
18+
<a target="_blank" rel="noopener noreferrer" href="https://dcode.fr/">dcode.fr</a> that maintain a list of known hashes for numbers and dictionary words, also known as a
1919
<a target="_blank" rel="noopener noreferrer" href="https://en.wikipedia.org/wiki/Rainbow_table">'Rainbow Table'</a>?
2020
</p>
2121
<p>

trainingportal/static/lessons/greenBelt/cwe327.sol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ This challenge shows a case where security practices were employed, however they
44

55
Did you know collisions to the MD5 hashing algorithm can be calculated within 1 day at modern computing power? This means that if an attacker knows the hash they could generate a string that will result in the same hash within 1 day. The SHA-1 algorithm has also been proven be prone to collisions, although it requires more computing power.
66

7-
However there's an even easier way to exploit these algorithms. Sites like **CrackStation.net** or **Hashes.com** maintain a large database of precalculated hashes. Because MD5 and SHA-1 require less computing power it is easier to pre-calculate hashes for such algorithms.
7+
However there's an even easier way to exploit these algorithms. There are online sites that maintain a large database of precalculated hashes. Because MD5 and SHA-1 require less computing power it is easier to pre-calculate hashes for such algorithms.
88

99
To pass this challenge:
1010

1111
- List the user password by leveraging the Missing Authorization vulnerability just like in the previous case.
12-
- Search for the hash on **CrackStation.net** or on **Hashes.com**.
12+
- Search for the hash on your online hash look-up service of choice.
1313
- Logout and re-login as '**user**' with the cracked password to solve the challenge.
1414

trainingportal/static/lessons/greenBelt/cwe759.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
</p>
1515
<p>
1616
Did you know that there are online sites like <a target="_blank" rel="noopener noreferrer" href="https://hashes.com/">Hashes.com</a> or
17-
<a target="_blank" rel="noopener noreferrer" href="https://crackstation.net/">CrackStation.net</a> that maintain a list of known hashes for numbers and dictionary words, also known as a
17+
<a target="_blank" rel="noopener noreferrer" href="https://dcode.fr/">dcode.fr</a> that maintain a list of known hashes for numbers and dictionary words, also known as a
1818
<a target="_blank" rel="noopener noreferrer" href="https://en.wikipedia.org/wiki/Rainbow_table">'Rainbow Table'</a>?
1919
</p>
2020
<p>

trainingportal/static/lessons/greenBelt/cwe759.sol.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ In order to prevent such attacks, passwords are salted with a random value which
88
To pass this challenge:
99

1010
- List the user password by leveraging the Missing Authorization vulnerability just like in the previous case.
11-
- Search for the hash on **CrackStation.net** or on **Hashes.com**. Notice that the detected hashing algorithm is SHA256 but that the password was still found.
11+
- Search for the hash on your online hash look-up service of choice.
1212
- Logout and re-login as '**user**' with the cracked password to solve the challenge.
1313

0 commit comments

Comments
 (0)