Tải bản đầy đủ
To encrypt die desired data, click the File option and select New from the menu bar.

To encrypt die desired data, click the File option and select New from the menu bar.

Tải bản đầy đủ

M o d u le 1 9 - C r y p to g r a p h y

0

\ - \ ° T

CrypTool 1.4.31 Beta 5 [VS2010]

File 1 Edit

View

Encrypt/Decrypt

Digital Signatures/PKI

New

Ctrl+N

Open...

Ctrl♦ 0

Close

Ctri*F4

Save

|

Indiv. Procedures

Analysis

Options

Window

x

Help

f|¥ ?|

Ctrl+S

Save as...
Document Properties...
Print...

Ctrl♦ P

Print Setup...
Recent Files
Alt+F4

Exit

1l

L

I

Creates a new docum ent

FIGURE 5.5: CrypTool MainWindow
0=5! CrypTool was
originallydesigned for
internal business
application for information
security.

6. Type a few lines 111 the opened Unnamedl Notepad of CrypTool.
7. On the menu bar, select Encrypt/Decrypt, Symmetric (modern),
and select any encrypting algorithm.
8. Select the RC2 encrypting algorithm.
CrypTool 1.4.31 Beta 5 [VS2010] ‫ ־‬Unnamedl
File

Edit

View ^ n c r y p ^ D e c ry p ^ Digital Signatu es/PKI

D la ‫ ־‬rf U

Indiv. Procedures

Analysis

Options

Window

Help

Symmetric (classic)
Symmetric (modern)
Asymmetric

RC2...

Hybrid

RC4...

The CrypTool portal is a centralized place forj
project. The CrypTool project develops th e w<
program s in th e are a of cryptography and cry

DES (ECB)...
DES (CBQ...
Triple DES (ECB)...
Triple DES (CBC)...
Rijndael (AES)...

Shift + Strg + R

Further Algorithms
AES (self extracting)...

Encryption / decryption with RC2

L:1 C.Z27 P:227

NUM

FIGURE 5.6: Select the RC2 Encrypt algorithm
9. 111 the Key Entry: RC2 wizard, select Key length from the dropdown list
10. Enter the key using hexadecimal characters and click Encrypt.

C E H L a b M a n u a l Page 948

E tliic a l H a c k in g and Countenneasures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

Key Entry: RC2
Enter the key using hexadecimal characters (0..9, A..F).

‫־‬3

! bits

Key length:

Decrypt

Encrypt

Cancel

FIGURE 5.7: SelectingKeyLengthin the hexadecimal character
11. RC2 encryption of Unnamed 1 notepad will appear as shown 111 the
following figure.
RC2 encryption of , key <00>
00000000
0000000c
00000018
00000024
00000030
0000003C
00000048
00000054
00000060
0000006C
00000078
00000084
00000090
0000009C
nnn nn ru fi

m CrypToolincludes
everystate-of-the-art
cryptographicfunctionand
allowsyoutolearnanduse
cryptographywithindie same
environment.

EC
40
AD
9B
6B
DD
96
BE
DA
2A
F3
96
C8
6B
F9

55
73
49
C8
4F
62
98
A9
E6
97
30
0A
00
2D
84

4F
6E
3D
C9
41
FB
78
7A
8B
BA
02
72
F0
3C
F9

23
09
B7
4B
12
9C
57
CE
DA
DA
5F
81
8B
91
17

16
A2
23
57
AE
E4
4B
2B
57
D6
5B
3A
EA
B9
39

IB
3A
B5
87
2A
A4
A6
81
5A
B2
03
C7
B9
6E
5‫ח‬

A4
9D
36
E2
2B
C2
E6
58
IB
62
8B
30
84
DD
1F

72
Fl
28
96
42
6C
B7
50
B2
24
77
6A
C8
5D
3‫ח‬

E4
24
43
71
57
98
99
A0
88
4F
B9
BB
BD
ID
7?

67
El
6D
48
CC
6B
94
94
EC
40
76
F8
2A
F8
?9

D4
CE
2F
46
09
0B
38
8C
78
49
41
E4
FB
C3
‫חח‬

IB
A7
BC
E3
43
71
7A
F4
Al
FC
4E
08
9D
DF
an

0 0 ■
. UO#. . . r . g . .
ten
. 1 = . # . 6 (C m /.
. . . KU . . . q H F .
kOA. . *+ B U . . C
. b ..........l . k . q
. . xWK
8z
. . z . + . X P ___
. . . . WZ. . . . x .
*
b $ 0 @ I.
. 0 . . w. vAN
. . r . : .0 j . . . .
*
k-<..n .]....
91 ■ r l

-

FIGURE 5.8: Output of RC2encrypteddata

Lab Analysis
Analyze and document die results related to die lab exercise.

P L E A S E

T A L K

T O

Y O U R

I N S T R U C T O R

R E L A T E D

Tool/U tility

T O

T H IS

IF

Y O U

H A V E

Q U E S T IO N S

L A B .

Information Collected/Objectives Achieved
Encrypted Algorithm: RC2

CrypTool
Result: Encrypted data for selected text

C E H L ab M a n u a l Page 949

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Stricdy Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

Questions
1. What are the alternatives to CrvpTool for encrypting data?
2. How can you differentiate between encrypting data 111 CrypTool and
other encrypting tools?
Internet Connection Required
□ Yes

0 No

Platform Supported
0 Classroom

C E H L a b M a n u a l Page 950

0 1Labs

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

E

U

n

c

s i n

r y

g

p

t i n

B

C

g

T

a

e

n

x

d

D

t E

n

e

c

c

o

r y

d

e

p

t i n

g

D

a

t a

r

BCTextEncoder simplifies encoding and decoding text data. Plaintext data is
con/pressed, encrypted, and converted to text format, which can then he easily
copied to the clipboard or saved as a textfile.
I C O N

K E Y

[£ Z 7 V a lu a b le
in f o r m a t io n

S

m

111 order to be an expert ethical hacker and penetration te ste r you must

have knowledge o f cryptography functions.

Test yo u r
k n o w le d g e



Lab Scenario

W e b e xe rcise
W o r k b o o k r e v ie w

Lab Objectives
Tins lab will give you experience 011 encrypting data and show you how to do it.
It will teach yo u how to:
■ Use encode/decode text data encrypted with a password

Lab Environment
To carry out the lab, you need:

■ BCTextEncoder located at D:\CEH-T00 ls\CEHv8 Module 19
Cryptography\Cryptography Tools\BCTextEncoder
& Tools
demonstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 19
Cryptography

■ You can also download the latest version of BCTextEncoder from the
link http://www.jet1c0.com/e 11ciTpt10n-bctextenc0der/
■ If you decide to download the latest version, then screenshots shown
111 the lab might differ
■ Run tins tool 011 Windows Server 2012 host machine
■ Administrative privileges to run the tool

Lab Duration
Time: 10 Minutes

C E H L a b M a n u a l Page 951

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

Overview of BCTextEncoder
BCTextEncoder uses public key encryption methods as well as password-based
encryption. Tins utility software uses strong and approved symmetric and public
key algonthms for data encryption.

a T»s■ 1
Encrypting the
Data

Lab Tasks
1. Double-click the BCTextEncoder.exe file. The main window of
BCTextEncoder appears, as displayed 111 the following figure.
L‫ ־‬I °

BCTextEncoder U tility v. 1.00.6
File

Edit

Key

O ptions

[3
Decoded plain text:

0

‫׳‬

-

Help

s?
Encode by:

?
password

v I

I

Encode

|
A

I

m You canalso
download BCTextEncoder
from
http://www.jetico.com
V

[_ Decode

Encoded text:

]
A

V

FIGURE6.1:MainwindowofBCTextEncoder
2. To encrypt the text, type the text 111 Clipboard (OR) select the secret
data and put it to clipboard with Ctrl+V.

C E H L a b M a n u a l Page 952

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

m BCTextEncoder
utilizes the following
encryption algorithms:
• ZLIBcompression
algorithm
• AES (Rijndael)
encryption algorithmfor
password based
encryption
• RSAasymmetric
encryption algorithmfor
public keyencryption

3. Click Encode. The Enter Password window will appear. Set the
password and confirm the same password 111 the respective fields.
4. Click OK.
‫־ ^ די‬

BCTextEncoder U tility v. 1.00.6
File

Edit

Key

O ptions

Help

Decoded plain text: 130 B

Encode by:

Login
Usern
Passv>

password

Enter password
Session key algorithm AES-256
Passw ord:

BCTextEncoder is
intended for fast
encoding and
decoding text data

•••••••••‫י‬

Cancel

Confirm :
Encoded text:

FIGURE 6.3: Set die password for encryption
5. The encoded text appears, as show 111 the following figure.

C E H L a b M a n u a l Page 953

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 1 9 - C r y p to g r a p h y

BCTextEncoder U tility v. 1.00.6
File

Edit

Key

O ptions

Decoded plain text: 128 B

m The main advantage
of BCTextEncoder is
support of public key
encryption.

1 1 ° ‫־‬

X

Help

Encode by:

password

v|

|

Encode

|
A

Login Infomation:
Username :samchoang ®yahoo. com
Password:asdfgh

V

[

Encoded text: 664 B

Decode
A

-----BEGIN ENCODED MESSAGE----Version: BCTextEncoder Utility v . 1.00.6
wy4ECQMCDgigsNHLCPBgULNwLKVwVmExFmiL/zkMcw9wj0hkL7w/dsw2sfC 51pJ3
OnABN +yXn 12R9NYpU6N lvNRNFwV +S9hLNrkA6A3eBumfSyNE70qdguFmjYs8yhV0
b 5b 5 -fblmROaUBQjcYNM 5XqpnTi4pfbsspMtTMzQgXATaiEEcS8MhEgyPqpdUrR 5
pmeRQVEVQY08GUbT+HiOyS 40
-----END ENCODED MESSAGE-----

FIGURE 6.4: Encoded text
3 t ask 2

Decrypting the
Data

6. To decrypt the data, you first clean the Decoded plain text
clipboard.
7. Click the Decode button

FIGURE 6.5:Decoding the data
8. The Enter password for encoding text widow will appear. Enter
die password 111 die Password held, and click OK.

C E H L a b M a n u a l Page 954

E th ic a l H a c k in g and C ounterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.