Appendix:Pokémon GO Player's Guide/Malware: Difference between revisions

m
no edit summary
m (It's misleading to not indicate that these checksums are SHA-256, not SHA-1)
mNo edit summary
Line 53: Line 53:
==Verifying if the file has been changed==
==Verifying if the file has been changed==


Another method, though not as simple, involves looking at the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash], which is a unique string of characters that tells whether a file is unaltered compared. The first string of characters below is the one associated with the legitimate app. The second is one that is known to have been used by a DroidJack version. Both are SHA-256 checksums.
Another method, though not as simple, involves looking at the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash], which is a unique string of characters that tells whether a file is unaltered. The first string of characters below is the one associated with the legitimate app. The second is one that is known to have been used by a DroidJack version. Both are SHA-256 checksums.


<code>8bf2b0865bef06906cd854492dece202482c04ce9c5e881e02d2b6235661ab67</code> - Legitimate app.
<code>8bf2b0865bef06906cd854492dece202482c04ce9c5e881e02d2b6235661ab67</code> - Legitimate app.
638

edits