Hash file. How to check the MD5 hash file in Windows. Windows image checks

PI of the exchange of information on computer networks Or through portable media, the question is about how to check the integrity of the transmitted information. After all, if several bits are saved in the resulting multi-scale file, it may cause problems when using this file. Especially if this file is an application. Therefore, when distributing various installation files, and other information is received to specify the checksum (hash) - so that users downloading the data can independently check the checksum of files for coincidence with the hash downloaded information.

Principles of using checksum

For the conscious use of technology it is useful to understand that it is a hash. In the general case, the hash is a set of bits obtained as a result of computing over information on a specific algorithm. A distinctive feature of such an algorithm is that when changing at least one bit in the source information, the hash amount also changes. And at the same time, the likelihood that a random change in several bits of incoming information will leave the hash unchanged. Thus, it turns out that the checksum is like a passport of the data by referring to which it can be concluded that the data is genuine.

Therefore, the principle of using hasha is quite simple, and consists of two stages:

1. Calculation, saving and publish the control sum of the original data.

2. Calculate its value for copies of data and reconciliation with the value for originals.

There are many different hashing algorithms. And, accordingly, there are many varieties of hash-sums. The most popular among them is CRC32., MD5, SHA-1 etc.

Where are Heachi applied?

Even those users who do not know what hash sums is still quite often use the benefits of their use - for example, when you open packaged files. The fact is that modern archivers add to the packed files of their hashi. You can see them by opening the archive using the archiver program.

And, accordingly, when unzipping, these hashi is automatically checked. If the archive is damaged, then the archiving program will give an error with the message that the file checks are not coincided. Therefore, the easiest way to ensure control of the correctness of the transfer of files is to pack them into the archive.

Another scope of application of checksums is the use of them instead of passwords. When the visitor is registered on some site, entering a secret password, then the password itself is saved on the server, and its hash. Accordingly, if the attackers will receive access to the server, they will not be able to learn saved passwords - they are simply not there.

Also hash-sums - an integral part of the operation of torrent trackers. Due to this, when downloading files through torrents, 100% information transfer integrity is guaranteed. At the same time, the user has no need to somehow control this process. All necessary operations when downloading the program (). Of course, if the files have long been downloaded, and you need to make sure whether they are damaged with time, then you can run again by manually repeated. For example, in the UTorrent program there is a special point in context menu (Appearing when you press the right mouse button on the selected torrent).

When using archives and torrents, hashing is carried out without user participation. But since not all files are conveniently archived and the more use torrents when sending information, there is a widespread practice of calculating checks for an arbitrary set of files. Most often for this, hash in MD5 format, for which many different programs have been created.

How to create MD5-hash files using MD5Checker?

Despite the fact that the MD5 algorithm is available in many file managers and utilities, not all of them convenient to use. Part of the programs do not know how to check hashies for a group of files. Another part of the programs though it does, but does not output a report on the results of the scan in a convenient form - you have to manually scroll through the entire list of files to identify error messages.

The only maximum convenient program for working with MD5 is the MD5Checker application. You can download the program with official Site. Despite the fact that the program has an English-speaking interface, it is simple enough to use it.

The default program is configured to hashing program files, archives and ISO images. Therefore, if you want to use this application to be allowed for music and video, you must first change one single setting - specify a mask for the files that the program will work. To do this, go to the "Tools / Options" menu item and in the "Include" field specify the * (which means "all files").

After that, you can use the program in normal mode - now everything will be scanned to single files in all subfolders.

To create a MD5-hash, you need to drag selected files from the folder to the program window - and the program will automatically start calculating the MD5 amounts for all selected files and all files in subfolders (satisfying the mask given by us). Calculated amounts will be displayed in the Current MD5 column ("Current MD5"). Now it remains only to save the values \u200b\u200bto the file by clicking the "S To" button.

At the same time, it is important to note that if you save the MD5 file in the folder in which our selected files and subfolders are located, then relative paths to them will be saved. This will allow in the future to check the checksum even if you transfer files to another location. Therefore, before saving the file, it makes sense to go to the root of the folder by pressing the appropriate button.

If you open the received file in notepad, you can see that the information is stored in it in the form of ordinary text.

You can make sure that the paths are saved relative, i.e. Do not contain a disk letter on which are located. Such a MD5 file can be stored in the folder with the files, and in the future on any computer, check the integrity of the files of this folder.

How to check the file checks?

To check the checksums of files, you need to re-run the program or click the "Clear" button to clear the list of files.

After that, you should drag the MD5 file to the program window and make sure that the green tick appeared opposite each file. This means that the files are kept safe and preservation. If there are quite a few files, then the control is more convenient to produce in the "Failed" and "Passed" counters ("not coincided" and "coincided") in the table heading.

You can conduct an experiment: rename one of the files, and one more edit, producing a couple of minor changes. After starting the re-check, the program revealed that one of the files was inaccessible under the original name (marked with a yellow icon), and the checksum of the second file did not match (marked with a red icon). The failure of the checksum indicates that the file either changed or damaged.

It is worth noting that if you have several folders, each of which has one or more MD5 files (including in subfolders), then dragging these all folders into the program window can be in one way to check all the files for integrity. MD5Checker automatically extracts haze values \u200b\u200bfrom the files that come when scanning files with the extension of MD5. It happens extremely convenient if copying or transmitting large amounts of information is made.

Also, if you renamed or transferred some files to another location, you can edit the MD5 file in the notepad, specifying there new values \u200b\u200bfor their paths - and then you can use it further to check the files.

RESULTS

The technology of hashing gives a unique ability to control the safety of information. At current times, when the number of user files is calculated by thousands and tens of thousands, it is necessary for the handling of hash-sums for large amounts of data. With this task, the MD5Checker program successfully copes, with which you can check the checksums and create them for a variety of files, regardless of the depth of their nesting in the folder tree.

Each file has its own unique value that can be used to check the file. This value is called the Hash or checksum. It is often used by developers. software When accessing files. The checksum takes place by reconciliation of the file in order to identify its integrity and coincidence with the specified identifier.

There are several algorithms for calculating the file checksum, among which the most well-known and distributed MD5, SHA256, SHA1, SHA384. Calculate the hash file, that is, its checksum, you can both standard Windows tools and third-party services. As part of this article, consider how to do it.

Table of contents:

How to find out the hash file via the command line

The command line in Windows allows you to perform various actionsAs with the system itself and with individual files. You can determine the control sum of files using the built-in CERTUTIL utility.

To learn the hash file through the command line, it is enough to enter the following query to the command prompt:

CERTUTIL -HASHFILE * Path to the file * * Algorithm *

Instead of * path to the file * You need to enter the full path to the file. For example: D: \\ 8.jpg

Instead of * algorithm * you need to enter the name of the algorithm in which you need to calculate the checksum. The CERTUTIL utility is able to calculate the checksum in algorithms: MD2, MD4, MD5, SHA1, SHA256, SHA384, SHA512.

After performing the specified command, you can see the hash file calculated using the CERTUTIL utility.

How to find out the hash file through the PowerShell utility

Another embedded in Windows utilitywhich is capable of determining the file checksum is PowerShell. It is different from CERTUTIL support more Algorithms for calculating the checksum: SHA256, MD5, SHA384, SHA1, SHA512, MACTRIPLEDES, RIPEMD160.

To check the hash through the PowerShell utility, the following command is used:

Get-Filehash * File path * | FORMAT-LIST.

Instead of * Path to the file * You must specify the full path to the file, the checksum of which is checked.

It is important to note that by default the PowerShell utility is calculated by the SHA256 algorithm.

If you want to use another algorithm, you need to specify the command when executing the query. For example, to determine the HASH according to the MD5 algorithm, you will need to execute the command:

Get-Filehash * Path to the * -algorithm MD5 file | FORMAT-LIST.

Instead of MD5, you can specify other supported by the utility algorithms.

How to find out the hash file using the hashtab utility

In addition to Windows tools to determine the file checks, you can use third-party applications. For example, one of the convenient programs capable of identifying a hash file is Hashtab. It is an extremely simple application that you can download for free from the Internet.

After loading the HashTab and installation program, the properties of the files creates new insetwhich is called the "hash amount of files". In this tab, you can see the calculation of the checksum for the file in different algorithms.

So, you have long and stubbornly loaded the image of Windows, and now you want to make sure that no byte has lost on the road. Or the Distribution you brought a kind fairy, and you want to check if it is connected with pirates. To determine the integrity of the distribution, you will need two things - checksum and program for checking it.

Windows image checks

UPD. 2017. Microsoft has shifted the downloads from MSDN to the new site https://my.visualstudio.com/downloads, where you need a subscription to access images. Therefore, without a subscription, the control sum below can not be recognized.

Microsoft publishes the checksums of its products on MSDN, indicating as a type of Sha1 hashing. Find the search for the linguistic version and the publication of your Windows and click IntelligenceTo see the checksum below.

This is half of the case.

Check the checksum using the built-in CERTUTIL utility

If you do not specify the parameter -Sha1The utility will calculate the hash MD5.

As you can see, everything is very simple! You can use this method to check the MD5 or SHA1 checksums of any files.

Check the checksum using the Hashtab program

If a command line You scares you, you can check the checksum in a simpler way.

  1. Download and install the HashTab program.
  2. Right-click on the image file and select "Properties".
  3. FILE HASHES TABLE (FILE HASHES).

By downloading to your computer or games from the Internet, you may notice more than once that in the description of the files of some installation images, this item is specified as "checksums" or "hash sums". What is a hash amount, why is it indicated on sites and how can you check it?

Hash-sum is the result of processing data of the hash function file. In essence, the hash amount is a personal digital identifier, with which you can check the integrity of the copied or loaded image, by comparing with the value of the hash-sum of the original file.

But why do you need to check the integrity of the downloaded image, if in the download manager or torrent client and so seen, the file loaded or not? The fact is that, unlike most multimedia files, such as photos, audozapsy or films, setup files Much more sensitive to the slightest damage. Therefore, if in the process of loading the image there were even small errors, during which only several bytes of information were lost, you may well have problems installing a system or an application from this image.

To avoid such problems, it is best to immediately check the value of the hash amount of the downloaded file, comparing it with the meaning that was specified in the description on the site from which the download was made this file. However, find out the meaning of the hash file using standard tools Operational windows systems Alas will not work, so you have to resort to help third-party program. For example, to check the hash you can install a specialized utility called Hashtab..

Hashtab is a very simple, convenient and lightweight program, besides, it is completely free. You can download the HashTab program from the developer's official website at this link: hashtab.ru/.

After installing the HashTab program, it will automatically be built into the standard Windows Explorer And you can easily find the hash sums of an absolutely any file on your computer.

In order for you to quickly understand how to work with this program, we will conduct one small experiment. Go to the official website of Microsoft, in the section windows downloads TECHNICAL PREVIEW, which is located at Windows.microsoft.com/ru-ru/windows/preview-DownLoad and download from there trial version The freshly baked operating system Windows 10. In this case, before downloading, we will definitely copy these hous-sum values \u200b\u200bof the image file that are specified on the site.

After the Windows Technical Preview image boots on hDD Computer, we will make a check check for conformity of the control hash-sums of the file located on the site and the image file loaded by us.

To find out the hash-sum of the file, right-click on it and select the item in the context menu. Properties. In the File Properties window, go to the tab. Hash-sum files. Here you can read the value of all three hash sums of the selected file (however, you will have to wait until the program calculates the hash value). However, few people will hunt for manually compare the value of hash-sums when it is possible to do it in automatic mode. Just copy the value of the hash amount of the source (downloadable from the site) file and paste it into the string Comparison of Hösha.

If the values \u200b\u200bof both hash sums coincide, it means that no errors have occurred during the download file, and you can safely install this operating system Or an application from the image. If the hash does not match, then it is better to download this file again, as it is better than the second time to reinstall the system or application due to problems that may occur both during the installation process and during subsequent work.

Also using the HashTab program you can compare the value of the hash sum of two identical files. For this, it is only necessary that they both are on a computer or at least on a removable drive connected to it. To compare the hash sums of the two allegedly identical files for identity, open the properties of one of the files on the tab Hash-sum filesClick on the button Compare file And specify the path to the second file. After that, the program will automatically make a calculation and comparison of the hash-sums of both files.

Have questions? - We will answer them for free

Often, get the cherished hashies - this is not all that needs to be done before starting Brut. Sometimes it is still useful to understand, and what, in fact, we will brow, determine the hash or in other words, find out what the hash was caught when holding a pentest.

Most. simple way Find out the hash algorithm - online service. One of the most popular Hesha online definition services is OnLinehashCrack.com.

Use this service very simple:

  1. Go to OnlineHashCrack.com
  2. Enter the found hash
  3. Get the result

The service is able to define over 250 types of haze.

Hesch Deteries With Hashid

In some cases, to climb the Internet to determine the type of hash will be difficult. In such situations you can use special utilities. One of the most popular to date is the Hashid tool.

This utility has replaced the Hashtag and Hash-Identifier utility.

hashid. - It is an extremely useful Tulza on Python 3, which will try to determine what kind of hash type in front of it.

In the Hashid library, more than two hundred different haze signatures and services that are used.


Hesch Definition With Hashid Utility

The utility is friendly with, and without problems launches and on the second Python branch.

Installing Hashid.

$ Pip Install Hashid
$ Pip Install --upgrade Hashid
$ pip uninstall hashid

Download Hashid.

You can download the utility from Githab. You will find there full list Supported haze in an excel file.

That's all. These tools definition hash should be enough for you. Good mood and information security!