Solved

MD5 in Hijackthis

Posted on 2007-04-05
5
417 Views
Last Modified: 2013-12-04
Dear Experts,
AS we know we have Unique MD5  For Every Files. So MD5 is a Good Way For differing From Real File than similar Files.
in Hijckthis Anlayze Section on thier Site We have Correct MD5 For Important Files. As those Reports and our calculating we can recognize Infected Files.
Which Program Can Calculate MD5 Cryption For a special Program?

Best Regards
Hamid Reza
0
Comment
Question by:123456
  • 3
  • 2
5 Comments
 
LVL 5

Accepted Solution

by:
DToolshed earned 125 total points
ID: 18856709
Here are 3 programs. They each have a free version, as well as a "commercial" version that you would pay for.

http://www.fastsum.com/
or
http://www.pc-tools.net/win32/md5sums/
or
http://www.irnis.net/soft/acsv/

Remember, MD5 is not perfect, and not totally unique. It can tell someone if a file was corrupt during download, but for file verification, it is not foolproof. It has been shown that some files can be modified in such a way as to create the original MD5 checksum again (2 different files with the same checksum is called a "collision").
http://en.wikipedia.org/wiki/MD5
0
 
LVL 2

Author Comment

by:123456
ID: 18868970
in some situations we want to copy our programs in a different Drive.
and Hijack report Mayour files may be a nasty file.
2- can you propose a solution to sure us for  differing from real file and similar files?

2 ---> have 125 other points.

0
 
LVL 5

Expert Comment

by:DToolshed
ID: 18869026
Well, MD5 is by far the most common, and probably the easiest. There is no system that I am aware of right now that can be 100% reliable, but MD5 is probably 99.95% reliable. You just have to be aware that it is not perfect, so that if something seems not right with a result, you can find another way to double check it. It doesn't happen often, but it does happen.
With MD5 checksums, even files of the same name and size will give a different MD5 sum, because the MD5 hash is created from the binary data itself. It is very hard to make another file result in an identical hash, but it has been done. If you are doing it to check for virus or spyware infection, checking against a known-good source copy of the file, and a known-good MD5 hash, then it's pretty reliable.
I don't see a need to use anything else right now. You just need to be aware that the system is not perfect. Just like everything else in computer security.
0
 
LVL 2

Author Comment

by:123456
ID: 18869105
does microsoft have knowldgment database For MD5 of windows Files?
0
 
LVL 5

Expert Comment

by:DToolshed
ID: 18869146
They don't have a database of MD5 hashes for Windows files.
They do have a command line tool for creating MD5 128-bit or SHA-1 160-bit value.
http://support.microsoft.com/kb/841290/
It can output to an XML file, and can be used in a batch file, so you can create your own database of your own systems. You have to maintain it whenever the system is changed, however. And that means you have to know what files are changed with each software install, and with every update/hotfix/service pack/etc. That can be a very large task.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
vMware vShield Endpoint 6.0 4 34
How do I get rid of mic.com pop ups on my MAC? 9 547
ransomware virus 21 82
Ransomware attacks 5 59
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now