Chapter 7. Encryption and Encoding

In this chapter, we will cover the following topics:

  • Generating an MD5 hash
  • Generating an SHA 1/128/256 hash
  • Implementing SHA and MD5 hashes together
  • Implementing SHA in a real-world scenario
  • Generating a Bcrypt hash
  • Cracking an MD5 hash
  • Encoding with Base64
  • Encoding with ROT13
  • Cracking a substitution cipher
  • Cracking the Atbash cipher
  • Attacking one-time pad reuse
  • Predicting a linear congruential generator
  • Identifying hashes

Introduction

In this chapter, we will be covering encryption and encoding in the world of Python. Encryption and encoding are two very important aspects of web applications, so doing them using Python!

We will be digging into the world of MD5s and SHA hashes, knocking on the door of Base64 and ROT13, and ...

Get Python: Penetration Testing for Developers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.