When you go to a website to download something, you sometimes see a hash for that file, usually in MD5 or SHA.
You then cross reference this hash with the hash you generate yourself when you run the file through something like CrypTool, to make sure the file is genuine...
But I do not understand the point of this exercise. Because if an attacker is going to modify the file for purposes of an attack, then wouldn't they also presumably have access to the HTML page where the file is hosted, and they can then modify the hash value?
I am confused...
You then cross reference this hash with the hash you generate yourself when you run the file through something like CrypTool, to make sure the file is genuine...
But I do not understand the point of this exercise. Because if an attacker is going to modify the file for purposes of an attack, then wouldn't they also presumably have access to the HTML page where the file is hosted, and they can then modify the hash value?
I am confused...