Root Me
Übersicht
Wer hat die Übung gelöst Kryptoanalyse / Hill Cipher
App - Skript
Anwendung - System
Knacken
Kryptoanalyse
Forensische
Programmierung
Realist
Netzwerk
Steganografie
Web - Kunde
Web - Server
AES - 4 Rounds
AES - Fault attack #1
AES - Fault attack #2
AES - CBC - Bit-Flipping Attack
AES - ECB
AES - Weaker variant
AES-PMAC
AES128 - CTR
Hill Cipher
Shift cipher
Circular Bit Shift
CISCO - Salted Password
Known plaintext - XOR
Code - Pseudo Random Number Generator
Pixel Madness
ECDHE
ECDSA - Implementation error
ECDSA - Introduction
ELF64 - PID encryption
Encoding - ASCII
Encoding - Codebook
Encoding - UU
FEAL - Differential Cryptanalysis
File - PKZIP
File - Insecure storage 1
GEDEFU
Hash - DCC
Hash - DCC2
Hash - LM
Hash - Message Digest 5
Hash - NT
Hash - SHA-2
Hash - SHA-3
LFSR - Known plaintext
Enigma Machine
OTP - Implementation error
PHP - mt_rand
Discrete logarithm problem
RSA - Corrupted key 1
RSA - Corrupted key 2
RSA - Corrupted key 3
RSA - Factorisation
RSA - Continued fractions
RSA - H-rabin
RSA - Lee cooper
RSA - Common modulus
RSA - Multiple recipients
RSA - Decipher Oracle
RSA - Padding
RSA - Signature
Service - CBC Padding
Service - Hash length extension attack
Service - Timing attack
Side Channel - AES : CPA
Side Channel - AES : first round
Monoalphabetic substitution - Caesar
Monoalphabetic substitution - Polybe
Polyalphabetic substitution - One Time Pad
Polyalphabetic substitution - Vigenère
System - Android lock pattern
Transposition - Rail Fence
Twisted secret
Initialisation Vector
White-Box Cryptography
Laden ...
117 Anzahl der Mitglieder die diese Übung gelöst haben
jeanb
Maxou_
sebbb
cdpointpoint
FoxCie
blackndoor
movrment
k4ndar3c
Skywhi
Arky
franb
Ryckeghem
LEK
NilDead
ENOENT
jambon69
superg1zm0
Tadlos-Nayr
o71
le6n6rl16n
glx1036
Leo
BOOM
antox
PLS
Shadeness
zancrows
mirasio
Jrmbt
ataumo
Gondowt
mjuuum
Fyxneo
pouf
Mister7F
iHso
rostale
corpsfini
DSpiricate
nico
Callyan
Wojtek
yokese
Podalirius
Nyu
Unactive
LazySloth
10function
KennedyS
archervatan
0
50
100