Post

File Integrity Verification with Hashing using CertUtil

Generating and comparing file hashes to verify data integrity on Windows 11 LTSC IoT.

CertUtil Hash Algorithm Initial SHA256 hash generation using CertUtil.

To demonstrate integrity checking using cryptographic hashes, I used CertUtil, a built-in Windows utility, to generate and verify SHA256 hashes on local files. This technique is vital in areas like forensics, secure backups, and malware detection, where detecting unauthorized changes is critical.


Test Setup

CertUtil Testfile Creation testfile successfully created and placed.

I created a sample file named testfile.txt, inserted simple text, and then used CertUtil to generate its hash. Afterwards, I modified the file to simulate tampering, then restored it to demonstrate hash matching.

After creating the sample file, i made a copy, so that it can be tampered with:

Testfile Copy completed Copy of testfile.txt.

Then i tested the hashes:

SHA256 Hashes tested Identical SHA256 hash generation proven.

Afterwards, i tampered with the copied file, and tested the hashes again:

CertUtil Hash Tamper Initial SHA256 hash is now different.

I also tested SHA1 and SHA512.

Different Hash Expansion Different hash algorithm visible.

This project ties directly into the Security+ Domain regarding Cryptographic Concepts.

Now, i have successfully demonstrated how:

Hashes detect changes in files.

Cryptographic integrity checks are critical for verifying file authenticity.

SHA256 is a secure hashing algorithm supported by Windows natively via certutil.

Skills demonstrated:

SHA256 hashing

Detecting file integrity violations

Using native Windows tools for secure file validation

Incident response preparation (malware detection, file baselining)


This post is licensed under CC BY 4.0 by the author.