This secure password, if we generate a hash algorithm

using the SHA256 algorithm or mathematical encryption,

we are going to translate this word,

the Security secure password

word into these numbers and letters.

This information actually if you use

these secure word to login into your, for example,

into your e-mail account,

if you go and try to instead use the secure password,

you use these string here,

these letters and numbers,

you are going to be rejected by the system.

But, in the cybersecurity word,

these numbers, these keys,

these letters and numbers means that

if somebody is going to use these password,

the signature, the hash will be something like this.

If for example that we change the D for S for example,

the hash will totally change.

So, again if we changed the S for D,

the hash will be the same.

So, this is a clear example of what hash means.

It is a procedure where

the mathematical algorithm goes

and generate the signature for,

in this case for a word but we can generate the signature

for a file or

something like a document something like that.

Another example probably more

clear example is something like this.

We could go to Kali.org,

this is a Linux distribution where used by

normal Penetration Masters to test

security in the enterprise environment.

But if we go here and we go to downloads,

then download Kali Linux we are going to see

a lot of links to download these Linux distribution.

But one interesting part here is this SHA256 Sum.

This is the algorithm,

this is the hash that we need to validate,

as soon as we download

these Kali Linux light version of Kali.

So, for example, if we download

this file and we start download for example here in HTTP,

the file will be downloaded.

As soon as the download is finish,

we should actually go to something like this,

hash file online,

e we could go to maybe here, file calculator.

In this case, we are going to use

this site MD5 File.com will allow us to drop

files and generate algorithms or the share results

for these five different algorithms.

This means that for example,

as soon as these download finish,

if we upload the file here into

these online calculator and we receive

something different than these number in that SHA256 Sum,

the file probably will be corrupted or the file suffers

something in the transit

between the Kali servers and our computer.

So, that is a clear example of how we could

use hashes in the real world,

in the cybersecurity word.