CSDF 2C ForensicHash Tool

Secure File Hashing & Verification Utility

Regular Hashing

Digital Fingerprinting (File Integrity)

Hashing creates a unique fixed-size string (digest) from a file. Even changing a single bit results in a completely different hash. This allows examiners to verify that evidence has not been altered since it was acquired. Common algorithms include SHA-256 (standard) and MD5 (legacy).
πŸ“‚

Drag & Drop file here or Browse

Requires input...

Compare Two Files

Verification & Validation

This tool compares the hash of an original piece of evidence against a copy or suspect file. If the hashes match, the files are bit-for-bit identical. This is critical for proving that forensic images or copies used for analysis are exact replicas of the original evidence.

Original File

πŸ“„

Select Original

Copy / Suspect

πŸ“‘

Select Copy

HMAC Generator

Hash vs HMAC (Why hashing alone isn’t secure)

A cryptographic hash (e.g., MD5, SHA-1, SHA-256) converts data into a fixed-length digest and is mainly used for integrity checking. However, regular hashing alone is not secure because it provides no authentication. Anyone can recompute the hash after modifying the data, making tampering undetectable if the attacker can replace both the data and its hash.

An HMAC (Hash-based Message Authentication Code) combines a cryptographic hash function with a secret key shared between trusted parties. This ensures both integrity and authenticity. Without the secret key, an attacker cannot generate a valid HMAC, even if they know the hashing algorithm.

Therefore, hashing alone only detects accidental changes, while HMAC protects against intentional tampering and forgery.
πŸ”

Drag & Drop file here or Browse

Requires input...

Generate Evidence Report

Chain of Custody Documentation

In forensic investigations, every action must be documented. This section generates a standardized log entry properly timestamped and signed. This report establishes who processed the evidence, when, and what the integrity result was, which is essential for court admissibility.
πŸ“‹

Select File for Report

Ready to generate...

Image Analysis (EXIF Tool)

Metadata Forensic Analysis

Digital photos contain hidden metadata (EXIF) such as camera model, timestamps, and GPS coordinates. This tool allows extraction of this data to place a suspect at a scene or verify authenticity. It also demonstrates how metadata can be manipulated (anti-forensics), serving as a warning to not blindly trust metadata.
πŸ“·

Select Image (JPEG) to Extract EXIF

Waiting for image...
✏️

Select Image to Modify

Image A

A

Select Original

Image B

B

Select Suspect

Waiting for images...

MITM Simulation

Interception Demo: Shows how attackers intercept data and why HMAC is critical for integrity.