Course
This course covers the exploitation of a length extension attack, which arises from improper use of hash functions in signing data. You will learn how to perform this attack and understand why HMAC should be preferred over simple hash functions for signing information.
Skills covered
Injection
Authentication
Authorisation
Cryptography
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.