Quick Checksum Verifier

Quick Checksum Verifier is one of the tools available in CEHv9(Certified Ethical Hacker v9) under the module Cryptography. This tool is very helpful in calculating MD5 hashes and verifying file integrity.

Quick Checksum Verifier will check the file integrity using the secure algorithms like MD5 and SHA-1 by calculating the hashes. Using this tool, the checksums of the files will be easily generated and at the same time, their integrity can be verified. The operation is straightforward, simply in 2 steps as follows

  • Loading the file and
  • Pasting the pre-calculated checksum.


  • Identifies and reveals the MD5 and SHA1 signatures of any files, regardless of their type, featuring support for comparing two hashes
  • Provides a feature for comparing two checksums, in order to find out whether they are identical or not.
  • Very responsive to commands and it runs on low CPU and RAM, so the computer’s overall performance is not affected in any way.

Latest Version:

The latest version is

GitHub Link:

Please find the link to download the Quick Checksum Verifier software:


Hands-on Lab:

  1. In this lab, we are going to verify the MD5 checksum values before editing a file and after editing the file.
  2. For this, we need to create a sample text file, for example, say txt with some sample text (Don’t edit the file content at this stage).
Quick Checksum Verifier - Sample.txt before editing
Fig 1.1: Sample.txt before editing
  1. After this step, install and launch the Quick Checksum Verifier If the software is launching for the first time, it will ask to choose the language. Select a language and click Next.
Quick Checksum Verifier Language window
Fig 1.2: Quick Checksum Verifier Language window
  1. After this step, the “Thank You” window of the Quick Checksum Verifier Click Next.
Quick Checksum Verifier Thank You window
Fig 1.3: Quick Checksum Verifier Thank You window
  1. As a next step, the main window appears. Under the part of Calculate Checksum, choose MD5 (Message-Digest Algorithm) from the available drop-down list.
Quick Checksum Verifier Main window
Fig 1.4: Quick Checksum Verifier Main window


  1. Now select the Browser for folder icon next to the Path field to open the file that we need to verify the Checksum value
Quick Checksum Verifier Specify the Target file
Fig 1.5: Specify the Target file
  1. Now select the Sample.txt from the respective path where it is available and click Open.
Quick Checksum Verifier Standard Windows Browse for Folder
Fig 1.6: Standard Windows Browse for Folder
  1. Once we selected the path for the respective file, Quick Checksum Verifier will automatically compute the Checksum of the same.
  2. Kindly note the Checksum value, once it is generated.
Sample.txt file Checksum value before editing or manipulating
Fig 1.7: Sample.txt file Checksum value before editing or manipulating
  1. As a subsequent phase, navigate to the respective path and open the Sample.txt file. Modify the file’s content and save the file in the same path.
Sample.txt Editing Sample.txt
Fig 1.8: Sample.txt Editing Sample.txt
  1. Now follow the steps 6-8 and then match the generated Checksum values of the file before and after modifying the content.
Sample.txt file Checksum value after editing or manipulating
Fig 1.9: Sample.txt file Checksum value after editing or manipulating


  1. In the real-time scenario, when a sender (Person X) sends the sensitive data to another person (Person Y), the sender will calculate its hashes and send the data along with calculated hashes to the receiver via a medium. Then the receiver after receiving the data, will make a note of the hash value, copy the message and calculate its hash value from his/her side. If the calculated hash value and the hash value noted earlier matches, it means that the received data has not been modified/altered by a third party (person/machine) during the transmission and is thus genuine.
  2. This type of Hash Calculation is mainly used to check data integrity.
  3. These steps are also applicable for the SHA-1 Secure Hashing Algorithm.

Share and Enjoy !

0 0 0

Leave a Reply

Your email address will not be published. Required fields are marked *

0 0