How to Verify SHA1 and SHA256 Checksum on Mac

It is incredibly easy to add a malicious components (malware) to DMG files,  uploading them to file sharing websites like sourceforge.net, & infecting computers on a mass scale.  SHA checksum is added to DMG files like TransmissionBT1, & Handbrake.fr2 to detect file tampering.

How to check SHA checksums:

In terminal, find the file(s) you’d like to check. “cd” command is to change directories, “ls” is to list files in a folder.

Use the following syntax: shamus file.dmg (Illustrated below)

sha checksum mac
sha checksum mac

The default for the shasum command is to use SHA1, the most common hash type, but this can be changed with the -a flag if necessary to 224, 256, 384, or 512.

Finally you can check the hexadecimal string on the main downloading website:

handbrake
handbrake

Always remember to download the files from a reputable source.

1. Popular BitTorrent Client Transmission Gets Infected With Malware Again
2. HandBrake hacked to drop new variant of Proton malware

Isaac Adams-Hands

Full Stack Developer, Digital Marketer, and InfoSec enthusiast. He received his Bachelor’s Degree from the University of Western Sydney and his Business Diploma from Georgian College before joining various marketing positions in search portals, e-commerce, higher education, and addiction recovery services.

Follow @ twitter

Related posts

Installing RKHunter on Ubuntu

SSH into your VPS host: ssh root@IP sudo apt-getco update sudo apt-get install binutils libreadline5 libruby1.8 ruby ruby1.8 ssl-cert unhide.rb mailutils Once it has finished downloaded, extract the files and enter the resulting directory: tar xzvf rkhunter* cd rkhunter* Install RKHunter: sudo ./installer.sh Initial Test Runs The first thing we should do is ensure that… Read More

What is Disaster Recovery as a Service (DRaaS)?

With the continuous emergence of technologies in the social and mobile world, businesses have had no choice but to be more yielding and responsive in their daily activities. However, as much as these business entities have been evolving with evolving technologies, the risk of disaster striking is high. The notion behind this argument is based… Read More