INTEGRITYGUARD

Cybersecurity Training Simulation

Beginner's Guide to Integrity Guard

Welcome to the Integrity Guard Cybersecurity Lab! This simulation will teach you the fundamental concepts of cryptography that secure modern digital systems, from basic passwords to blockchain technology. Follow this guide to solve each level.

STEP 1 Level 1: The Avalanche Effect

Goal: Understand how hashing algorithms turn data into a fixed-length string, and how a tiny change alters everything.

  1. Click the Level 1: Avalanche tab above.
  2. Type the word "Apple" into the Data Input box. Notice the 64-character SHA-256 hash below it.
  3. Click the Set Baseline For Comparison button. This saves your hash.
  4. Now, change the capital "A" to a lowercase "a" (make it "apple").
  5. Look at the Avalanche Comparison panel below. You will see that almost every character in the hash has changed, even though you only changed one letter!

Why it matters: This property ensures that if someone tampers with a file or a message, the hash changes completely, making tampering obvious immediately.

STEP 2 Level 2: The Salt Shaker

Goal: Learn how databases store passwords and why "salting" is crucial to stop hackers.

  1. Click the Level 2: Salt Shaker tab. You'll see a database of users with their MD5 hashed passwords.
  2. On the right is a Rainbow Table—a hacker's list of pre-calculated hashes for common passwords.
  3. Hack the database: Click and drag the password password123 from the Rainbow Table and drop it onto the row for the user admin. It will show as CRACKED!
  4. Secure the database: Now, click the Toggle Salt button at the top right to turn it ON.
  5. Notice that a random string (the salt) was added to each user, and their hashes completely changed.
  6. Try dragging password123 onto admin again. It will fail with a Mismatch. The Rainbow Table is now useless!

Why it matters: Salting adds random data to your password before hashing it. Even if two users have the password "password123", their hashes will look entirely different.

STEP 3 Level 3: The Block Miner

Goal: Understand how blockchains link data together securely using hashes and Proof-of-Work.

  1. Click the Level 3: Block Miner tab. You'll see 3 blocks linked in a chain. A block is "valid" (green) if its hash starts with four zeros (0000...).
  2. Look at Block #2. In its Data text area, change 50 coins to 500 coins.
  3. Observe the chain reaction! Block #2 turns red because its hash changed and no longer starts with four zeros. Block #3 turns red because it points to the old hash of Block #2. The chain is broken.
  4. Fix the chain: Click the Mine button on Block #2. The system will rapidly guess the Nonce number until it finds a valid hash starting with 0000.
  5. Once Block #2 turns green again, you must now click Mine on Block #3 to recalculate its hash using the new data from Block #2.

Why it matters: This is why cryptocurrency ledgers are immutable. If someone tries to alter a past transaction, they break the entire chain and have to re-mine every subsequent block, which requires massive computational power.

Click to begin the simulation.