CBC-MAC II
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
Course
Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
Make sure you check out PentesterLab PRO and PentesterLab PRO Enterprise to develop your skills.