THM Encryption Crypto 101 - grunt92/IT-Sec-WriteUps GitHub Wiki
What will this room cover?
I'm ready to learn about encryption
No answer needed
Key terms
I agree not to complain too much about how theory heavy this room is.
No answer needed
Are SSH keys protected with a passphrase or a password?
passphrase
Why is Encryption important?
What does SSH stand for?
Secure Shell
How do webservers prove their identity?
certificate
What is the main set of standards you need to comply with if you store or process payment card details?
PCI-DSS
Crucial Crypto Maths
What's 30 % 5?
0
What's 25 % 7
4
What's 118613842 % 9091
3565
Types of Encryption
Should you trust DES? Yea/Nay
Nay
What was the result of the attempt to make DES more secure so that it could be used for longer?
Triple Des
Is it ok to share your public key? Yea/Nay
Yea
RSA - Rivest Shamir Adleman
p = 4391, q = 6659. What is n?
29239669
I understand enough about RSA to move on, and I know where to look to learn more if I want to.
No answer needed
Establishing Keys Using Asymmetric Cryptography
I understand how keys can be established using Public Key (asymmetric) cryptography.
No answer needed
Digital signatures and Certificates
Who is TryHackMe's HTTPS certificate issued by?
E1
SSH Authentication
I recommend giving this a go yourself. Deploy a VM, like Linux Fundamentals 2 and try to add an SSH key and log in with the private key.
No answer needed
Download the SSH Private Key attached to this room.
No answer needed
What algorithm does the key use?
RSA
Crack the password with John The Ripper and rockyou, what's the passphrase for the key?
run ssh2john idrsa.id_rsa > id.txt
and than john --wordlist=/Path/to/wordlist.txt id.txt
to get the passphrase and the answer.
delicious
Explaining Diffie Hellman Key Exchange
I understand how Diffie Hellman Key Exchange works at a basic level
No answer needed
PGP, GPG and AES
Time to try some GPG. Download the archive attached and extract it somewhere sensible.
No answer needed
You have the private key, and a file encrypted with the public key. Decrypt the file. What's the secret word?
Download and extract the .zip-file use gpg --import tryhackme.key
to import the key and than gpg --decrypt message.gpg
to get the answer.
Pineapple
The Future - Quantum Computers and Encryption
I understand that quantum computers affect the future of encryption. I know where to look if I want to learn more.
No answer needed