Root Me
Übersicht
Wer hat die Übung gelöst Kryptoanalyse / ECDHE
App - Skript
Anwendung - System
Knacken
Kryptoanalyse
Forensische
Programmierung
Realist
Netzwerk
Steganografie
Web - Kunde
Web - Server
AES - 4 Rounds
AES - Fault attack #1
AES - Fault attack #2
AES - CBC - Bit-Flipping Attack
AES - ECB
AES - ECB - Copy Paste
AES - Weaker variant
AES-PMAC
AES128 - CTR
Hill Cipher
Shift cipher
Circular Bit Shift
CISCO - Salted Password
Known plaintext - XOR
Code - Pseudo Random Number Generator
Pixel Madness
ECDHE
ECDSA - Implementation error
ECDSA - Introduction
ELF64 - PID encryption
Encoding - ASCII
Encoding - Codebook
Encoding - UU
FEAL - Differential Cryptanalysis
File - PKZIP
File - Insecure storage 1
GEDEFU
Hash - DCC
Hash - DCC2
Hash - LM
Hash - Message Digest 5
Hash - NT
Hash - SHA-2
Hash - SHA-3
LFSR - Known plaintext
Enigma Machine
OTP - Implementation error
PHP - mt_rand
Discrete logarithm problem
RSA - Corrupted key 1
RSA - Corrupted key 2
RSA - Corrupted key 3
RSA - Factorisation
RSA - Continued fractions
RSA - H-rabin
RSA - Lee cooper
RSA - Common modulus
RSA - Multiple recipients
RSA - Decipher Oracle
RSA - Padding
RSA - Signature
Service - CBC Padding
Service - Hash length extension attack
Service - Timing attack
Shamir Secret Sharing - Introduction
Shamir Secret Sharing - Irreducible ?
Shamir Secret Sharing - Reduction
Shamir Secret Sharing - Traitor
Side Channel - AES : CPA
Side Channel - AES : first round
Monoalphabetic substitution - Caesar
Monoalphabetic substitution - Polybe
Polyalphabetic substitution - One Time Pad
Polyalphabetic substitution - Vigenère
System - Android lock pattern
Transposition - Rail Fence
Twisted secret
Initialisation Vector
White-Box Cryptography
Laden ...
220 Anzahl der Mitglieder die diese Übung gelöst haben
Hedroed
Meijilol
Spl1nt3r
yeeeeps
Mister7F
berceanbogdan
3cl1ps
retyuil
g2i
John Russel
corpsfini
Forgi
DSpiricate
Faulst
ocalex86
nico
berga
Quanthor_ic
O4-K
hTm1zZwW
yaumn
Wojtek
Re:Z3R0
Th3_JagDt1g3R
JPL
Th3G3ntl3man
hexabeast
yokese
Podalirius
Nyu
Huuuuwiiiit
Lou
McMoudi
Unactive
RadekG
LazySloth
$in
sirk390
KennedyS
gwel
skilo
Cryptanalyse
cb34
Kurt
NonStandardModel
macz
Sgt. Pepper
pierrafleur
so3
Headorteil
0
50
100
150
200