6 results found
This exercise details how to tamper with data encrypted using CBC
This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
This exercise explains how you can tamper with encrypted cookies to access another user's account
This exercise covers the exploitation of a weakness in the usage of ECDSA
This exercise covers the exploitation of a vulnerability impacting Monocypher.