<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Encryption</id>
		<title>Encryption - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Encryption"/>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Encryption&amp;action=history"/>
		<updated>2026-04-26T16:04:01Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://beardedmaker.com/wiki/index.php?title=Encryption&amp;diff=165&amp;oldid=prev</id>
		<title>Beard: Created page with &quot;&lt;pre&gt; WEP - Wired Equivalent Privacy WPA - Wi-Fi Protected Access RC4 - stream encryption used by WEP. Cycles through 24 bit init vector.  TKIP - Temporary Key Integrity Proto...&quot;</title>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Encryption&amp;diff=165&amp;oldid=prev"/>
				<updated>2016-02-29T21:45:44Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; WEP - Wired Equivalent Privacy WPA - Wi-Fi Protected Access RC4 - stream encryption used by WEP. Cycles through 24 bit init vector.  TKIP - Temporary Key Integrity Proto...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
WEP - Wired Equivalent Privacy&lt;br /&gt;
WPA - Wi-Fi Protected Access&lt;br /&gt;
RC4 - stream encryption used by WEP. Cycles through 24 bit init vector. &lt;br /&gt;
TKIP - Temporary Key Integrity Protocol. used in WPA. generates sequence of RC4 keys based on one master key. It changed that key every 10k packets. Also uses Message Integrity Code(MIC) to check if a packet has been tampered with. If so, it changes the key.&lt;br /&gt;
DES - Data Encryption Standard. Block cipher using a symmetric-key algorithm using 56 bit key.&lt;br /&gt;
DEA - Data Encryption Algorithm. Same as above, but specifically referring to the algorithm.&lt;br /&gt;
AES-CCMP - Advanced Encryption Standard with Counter-Mode/CBC-MAC Protocol. 128, 192, and 256 bit.&lt;br /&gt;
CBC - Cipher-Block Chaining&lt;br /&gt;
TLS - Transport Layer Security. &lt;br /&gt;
SHA - Secure Hash Algorithm. &lt;br /&gt;
&lt;br /&gt;
RSA - Algorithm for encryption and signing.&lt;br /&gt;
DSA - Algorithm for signing. Preferable for signing, more secure, but slower.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=======&lt;br /&gt;
openssl&lt;br /&gt;
=======&lt;br /&gt;
&lt;br /&gt;
openssl &amp;lt;encryption&amp;gt; &amp;lt;args&amp;gt;&lt;br /&gt;
	encryption&lt;br /&gt;
		passwd - creates password hash&lt;br /&gt;
		aes-256-cbc - strong aes (good for files)&lt;br /&gt;
		genrsa &amp;lt;args&amp;gt; &amp;lt;bits&amp;gt;- generate rsa key&lt;br /&gt;
			-aes256&lt;br /&gt;
			-des3&lt;br /&gt;
			-out &amp;lt;file&amp;gt; - key output&lt;br /&gt;
			2048 - bits&lt;br /&gt;
		req - generate and manage certificates&lt;br /&gt;
			-x509 - generate an x509 certificate&lt;br /&gt;
			-new - use if key is already made&lt;br /&gt;
			-key - specify premade key&lt;br /&gt;
			-newkey rsa:1024 - type:bits (also dsa:file)&lt;br /&gt;
			-keyout key.pem - output private key&lt;br /&gt;
			-out cert.pem - output certificate&lt;br /&gt;
			-days &amp;lt;#&amp;gt; - days before cert expires&lt;br /&gt;
		s_server - listen&lt;br /&gt;
			-cert &amp;lt;file&amp;gt; - key/cert file&lt;br /&gt;
			-accept &amp;lt;port&amp;gt; - port number to accept&lt;br /&gt;
		s_client - connect&lt;br /&gt;
			-cert &amp;lt;file&amp;gt; - key/cert file&lt;br /&gt;
			-connect &amp;lt;host&amp;gt;:&amp;lt;port&amp;gt; - connect to server&lt;br /&gt;
		rand &amp;lt;opt&amp;gt; &amp;lt;#&amp;gt; - generate random bytes&lt;br /&gt;
			-base64&lt;br /&gt;
			-hex&lt;br /&gt;
		ciphers -v - list of ciphers&lt;br /&gt;
		prime &amp;lt;#&amp;gt; - test if # is prime&lt;br /&gt;
			-hex&lt;br /&gt;
	general args:&lt;br /&gt;
		-e - encrypt (default)&lt;br /&gt;
		-d - decrypt&lt;br /&gt;
		-k &amp;lt;passwd&amp;gt; - provide password&lt;br /&gt;
		-salt &amp;lt;string&amp;gt; - provide salt (not stated while decrypting)&lt;br /&gt;
		-a - output in base64 (makes viewable in text)&lt;br /&gt;
		-table - output as table&lt;br /&gt;
	&lt;br /&gt;
	&lt;br /&gt;
&lt;br /&gt;
examples:&lt;br /&gt;
	openssl passwd &amp;lt;password&amp;gt; &lt;br /&gt;
	openssl passwd -salt AB &amp;lt;password&amp;gt; -out file.txt&lt;br /&gt;
	echo 'hello world' | openssl aes-256-cbc -a -salt -k &amp;lt;password&amp;gt; #encrypt&lt;br /&gt;
	echo '&amp;lt;hash&amp;gt;' | openssl aes-256-cbc -a -d -k &amp;lt;password&amp;gt; #decrypt&lt;br /&gt;
	openssl aes-256-cbc -salt -in file1 -out file2&lt;br /&gt;
&lt;br /&gt;
generate certificate:&lt;br /&gt;
	openssl genrsa -aes256 -out key.pem 2048 #create private key&lt;br /&gt;
	openssl req -x509 -new -key key.pem &amp;gt;&amp;gt; key.pem #create certificate and append to private key&lt;br /&gt;
&lt;br /&gt;
encrypted tcp connection:&lt;br /&gt;
	openssl s_server -cert key.pem -accept &amp;lt;port&amp;gt; #server listen&lt;br /&gt;
	openssl s_client -cert key.pem -connect &amp;lt;host&amp;gt;:&amp;lt;port&amp;gt; #client connect&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=========&lt;br /&gt;
checksums&lt;br /&gt;
=========&lt;br /&gt;
&lt;br /&gt;
create/check checksum with:&lt;br /&gt;
	md5sum&lt;br /&gt;
	shasum&lt;br /&gt;
	sha1sum&lt;br /&gt;
	sha224sum&lt;br /&gt;
	sha256sum&lt;br /&gt;
	sha384sum&lt;br /&gt;
	sha512sum&lt;br /&gt;
&lt;br /&gt;
all of them work like:&lt;br /&gt;
	md5sum &amp;lt;file&amp;gt; &amp;gt; &amp;lt;checksum.txt&amp;gt; - create checksum&lt;br /&gt;
	md5sum -c &amp;lt;checksum.txt&amp;gt; - check the checksum (do while in dir of file)&lt;br /&gt;
&lt;br /&gt;
========&lt;br /&gt;
cracking&lt;br /&gt;
========&lt;br /&gt;
&lt;br /&gt;
john the ripper:&lt;br /&gt;
&lt;br /&gt;
	NOTE: sometimes expects hashfile to be formatted as: username:hash. username can be anything.&lt;br /&gt;
	&lt;br /&gt;
	john - shows help plus supported algorithms&lt;br /&gt;
	john hashfile.txt - cracks hashes in file&lt;br /&gt;
		--single - single crack mode&lt;br /&gt;
		--wordlist=file - use dictionary attack with file as wordlist&lt;br /&gt;
		--incremental - use brute force. can use --incremental=mode where mode can be &amp;quot;All&amp;quot; or something else&lt;br /&gt;
		--test - benchmark system&lt;br /&gt;
		--users=user,user - users to crack form hashfile&lt;br /&gt;
		--salts=&amp;lt;#/-#&amp;gt;&lt;br /&gt;
		--format=type - force hash type &lt;br /&gt;
			DES/BSDI/MD5/BF/AFS/LM/NT/mscash/NETLM/NETNTLM/bfegg/DOMINOSEC/lotus5/raw-MD5/raw-sha1/IPB2/nsldap/openssha/HDAA&lt;br /&gt;
	example:&lt;br /&gt;
		john --format=raw-MD5 hashfile.txt&lt;br /&gt;
&lt;br /&gt;
ophcrack:&lt;br /&gt;
	ophcrack -d /path/tables -t table1:table2 -w /path/config -l /path/outputfile	&lt;br /&gt;
		-g - use gui&lt;br /&gt;
		-b - disable brute force&lt;br /&gt;
		-f /path/file - load hash from file instead of samfile (-w /path/config)&lt;br /&gt;
&lt;br /&gt;
lcrack:&lt;br /&gt;
&lt;br /&gt;
	NOTE: sometimes expects hashfile to be formatted as: username:hash. username can be anything.&lt;br /&gt;
&lt;br /&gt;
	lcrack &amp;lt;options&amp;gt; &amp;lt;file&amp;gt; - shows help plus supported algorithms&lt;br /&gt;
		-o &amp;lt;file&amp;gt; - output file&lt;br /&gt;
		-d &amp;lt;file&amp;gt; - wordlist file&lt;br /&gt;
		-t &amp;lt;file&amp;gt; - use table file&lt;br /&gt;
		-s &amp;lt;charset&amp;gt; - charset for incremental&lt;br /&gt;
		-s# &amp;lt;file&amp;gt; - charset from file&lt;br /&gt;
		-l &amp;lt;lenset&amp;gt; - length-set for incremental&lt;br /&gt;
		-x&amp;lt;mode&amp;gt;[+|-]  : activate/deactivate specified mode&lt;br /&gt;
			l - login mode&lt;br /&gt;
			f - fast word list mode&lt;br /&gt;
			s - smart word list mode&lt;br /&gt;
			b - incremental (brute-force) mode&lt;br /&gt;
		-rand - randomized brute-force mode&lt;br /&gt;
		-m &amp;lt;method&amp;gt; - hash algorithm. default: null&lt;br /&gt;
			dom/md4/md5/nt4/null/sha1&lt;br /&gt;
	example:&lt;br /&gt;
		lcrack -m md5 -xb+ hashfile.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Beard</name></author>	</entry>

	</feed>