{"id":8711,"date":"2016-03-22T22:39:15","date_gmt":"2016-03-23T01:39:15","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=8711"},"modified":"2019-05-29T16:53:08","modified_gmt":"2019-05-29T19:53:08","slug":"ccrypt-criptografia-e-descriptografia-de-arquivos","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2016\/03\/exploits\/ccrypt-criptografia-e-descriptografia-de-arquivos\/","title":{"rendered":"Ccrypt  Criptografia e Descriptografia de arquivos"},"content":{"rendered":"<p style=\"text-align: justify;\"><span id=\"result_box\" lang=\"pt\"><span title=\"ccrypt is a utility for encrypting and decrypting files and streams.\">Ccrypt \u00e9 um ferramenta para criptografar e descriptografar arquivos. <\/span><span title=\"It was designed as a replacement for the standard unix crypt utility, which is notorious for using a very weak encryption algorithm.\">Foi desenvolvido como um substituto para o utilit\u00e1rio <span id=\"result_box\" lang=\"pt\"><span title=\"It was designed as a replacement for the standard unix crypt utility, which is notorious for using a very weak encryption algorithm.\">padr\u00e3o<\/span><\/span> unix crypt, que \u00e9 famoso por usar um algoritmo de criptografia muito fraca. C<\/span><span title=\"ccrypt is based on the Rijndael block cipher, a version of which is also used in the Advanced Encryption Standard (AES, see http:\/\/www.nist.gov\/aes).\">crypt \u00e9 baseado no bloco cifra Rijndael, uma vers\u00e3o que tamb\u00e9m \u00e9 usada no Advanced Encryption Standard (AES, consulte http:\/\/www.nist.gov\/aes). <\/span><span title=\"This cipher is believed to provide very strong security. \">Esta cifra possibilita fornecer uma seguran\u00e7a muito forte.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt.\">Ao contr\u00e1rio de unix crypt, o algoritmo fornecido pela Ccrypt n\u00e3o \u00e9 sim\u00e9trica, ou seja, deve-se especificar-se para criptografar ou descriptografar. <\/span><span title=\"The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt.\">A maneira mais comum para invocar Ccrypt \u00e9 atrav\u00e9s dos <span id=\"result_box\" lang=\"pt\"><span title=\"The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt.\">comandos <\/span><\/span>ccencrypt e ccdecrypt. <\/span><span title=\"There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around.\">H\u00e1 tamb\u00e9m um comando CCAT para desencriptar um diret\u00f3rio diretamente para o terminal, reduzindo assim a probabilidade de deixar arquivos de texto simples tempor\u00e1rios. <\/span><span title=\"In addition, there is a compatibility mode for decrypting legacy unix crypt files.\">Al\u00e9m disso, h\u00e1 um modo de compatibilidade para descriptografar arquivos UNIX. <\/span><span title=\"An emacs mode is also supplied for editing encrypted text files. \">Um modo de emacs tamb\u00e9m \u00e9 fornecido para edi\u00e7\u00e3o de arquivos de texto criptografados.<\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"Encryption and decryption depends on a keyword (or key phrase) supplied by the user.\">Criptografia e descriptografia depende de uma palavra-chave (ou frase-chave) fornecido pelo usu\u00e1rio. <\/span><span title=\"By default, the user is prompted to enter a keyword from the terminal.\">Por padr\u00e3o, o usu\u00e1rio \u00e9 solicitado a digitar uma palavra-chave a partir do terminal. <\/span><span title=\"Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits).\">Palavras-chave pode consistir em qualquer n\u00famero de caracteres, e todos os caracteres s\u00e3o significativos (embora Ccrypt coloca internamente a <span id=\"result_box\" lang=\"pt\"><span title=\"Keywords can consist of any number of characters, and all characters are significant (although ccrypt internally hashes the key to 256 bits).\">hash, como<\/span><\/span> chave para 256 bits). P<\/span><span title=\"Longer keywords provide better security than short ones, since they are less likely to be discovered by exhaustive search. \">alavras-chave maiores podem fornecer melhor seguran\u00e7a do que as curtas, uma vez que elas s\u00e3o menos propensas a serem descobertas por pesquisas exaustivas.<\/span><\/p>\n<p style=\"text-align: justify;\">Pequeno v\u00eddeo utilizando Ccrypt para criptografia e Descriptografia de arquivos.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #ff0000;\">AVISO IMPORTANTE<\/span><br \/>\n<\/strong><\/p>\n<p style=\"text-align: justify;\">Utilize a ferramenta somente para fins profissionais e de forma \u00e9tica \u201cinvas\u00e3o de computador \u00e9 Crime\u201d!<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/8JVnKaurWGc\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p style=\"text-align: justify;\">Um grande abra\u00e7o a todos !!!<\/p>\n<p style=\"text-align: justify;\">Fonte: <a title=\"Ccrypt\" href=\"http:\/\/ccrypt.sourceforge.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/ccrypt.sourceforge.net\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ccrypt \u00e9 um ferramenta para criptografar e descriptografar arquivos. Foi desenvolvido como um substituto para o utilit\u00e1rio padr\u00e3o unix crypt, que \u00e9 famoso por usar um algoritmo de criptografia muito fraca. Ccrypt \u00e9 baseado no bloco cifra Rijndael, uma vers\u00e3o que tamb\u00e9m \u00e9 usada no Advanced Encryption Standard (AES, consulte http:\/\/www.nist.gov\/aes). Esta cifra possibilita fornecer [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21],"tags":[],"class_list":["post-8711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=8711"}],"version-history":[{"count":13,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8711\/revisions"}],"predecessor-version":[{"id":10319,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8711\/revisions\/10319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/8712"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=8711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=8711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=8711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}