"A sensitive file belonging to an organization has been leaked and potentially modified. The organization has stored the original MD5 hash for integrity verification. Analyze the leaked file and compare its hash with the original to determine whether the file has been modified."
Has the file been modified?
A. No
B. Yes
Hint: Matching hashes = original file. Different hashes = modified file. Compare the character strings carefully.
Explanation: MD5 hashing is used to verify file integrity. If the hash of a file changes, it means the file content has been altered. Since the calculated hash (7d79...) differs from the original hash (5d41...), the file has been modified.
Attacker Machine - Documents
📁 Folder: Hash
📄OriginalFileHash.txt
📄Sensitiveinfo.txt
OriginalFileHash.txt
Original MD5 Hash:
5d41402abc4b2a76b9719d911017c592
Sensitiveinfo.txt
File Content:
Employee Data: John Doe
Salary: $55,000
Position: Web Developer
Access Code: 4921-XAB [MODIFIED]
Calculating hash... processing segments... done.
Calculated MD5 Hash:
7d793037a0760186574b0282f2f435e7
Note: If the hash values do not match, the file has been modified.