Quick Checksum Verifier is one of the tools available in CEHv9(Certified Ethical Hacker v9) under the module Cryptography. This tool is very helpful in calculating MD5 hashes and verifying file integrity.
Quick Checksum Verifier will check the file integrity using the secure algorithms like MD5 and SHA-1 by calculating the hashes. Using this tool, the checksums of the files will be easily generated and at the same time, their integrity can be verified. The operation is straightforward, simply in 2 steps as follows
- Loading the file and
- Pasting the pre-calculated checksum.
- Identifies and reveals the MD5 and SHA1 signatures of any files, regardless of their type, featuring support for comparing two hashes
- Provides a feature for comparing two checksums, in order to find out whether they are identical or not.
- Very responsive to commands and it runs on low CPU and RAM, so the computer’s overall performance is not affected in any way.
The latest version is 188.8.131.52
Please find the link to download the Quick Checksum Verifier software:
- In this lab, we are going to verify the MD5 checksum values before editing a file and after editing the file.
- For this, we need to create a sample text file, for example, say txt with some sample text (Don’t edit the file content at this stage).
- After this step, install and launch the Quick Checksum Verifier If the software is launching for the first time, it will ask to choose the language. Select a language and click Next.
- After this step, the “Thank You” window of the Quick Checksum Verifier Click Next.
- As a next step, the main window appears. Under the part of Calculate Checksum, choose MD5 (Message-Digest Algorithm) from the available drop-down list.
- Now select the Browser for folder icon next to the Path field to open the file that we need to verify the Checksum value
- Now select the Sample.txt from the respective path where it is available and click Open.
- Once we selected the path for the respective file, Quick Checksum Verifier will automatically compute the Checksum of the same.
- Kindly note the Checksum value, once it is generated.
- As a subsequent phase, navigate to the respective path and open the Sample.txt file. Modify the file’s content and save the file in the same path.
- Now follow the steps 6-8 and then match the generated Checksum values of the file before and after modifying the content.
- In the real-time scenario, when a sender (Person X) sends the sensitive data to another person (Person Y), the sender will calculate its hashes and send the data along with calculated hashes to the receiver via a medium. Then the receiver after receiving the data, will make a note of the hash value, copy the message and calculate its hash value from his/her side. If the calculated hash value and the hash value noted earlier matches, it means that the received data has not been modified/altered by a third party (person/machine) during the transmission and is thus genuine.
- This type of Hash Calculation is mainly used to check data integrity.
- These steps are also applicable for the SHA-1 Secure Hashing Algorithm.