Pixel Madness

15 Punkte  0x0

Autor

Ryscrow,  

Stufe  Schwierigkeitsgrad

Validierung

9124 Herausforderer 6%

Bewertung  Bewertung

439 votes

Bitte loggen Sie sich ein um auf diese Seite zugreifen zu können

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
Elem35   Décomposition pixelisée 26. Mai 2020 zu  22:20
hassanbouchibti   Décomposition pixelisée 26. Mai 2020 zu  20:42
0x00   Pixel Madness 26. Mai 2020 zu  16:06
matt   Décomposition pixelisée 26. Mai 2020 zu  15:48
ubz0   Décomposition pixelisée 26. Mai 2020 zu  03:38
ABH   Décomposition pixelisée 26. Mai 2020 zu  01:50
ravinder   Pixel Madness 25. Mai 2020 zu  22:07
Nexwraze   Décomposition pixelisée 25. Mai 2020 zu  20:09
Weiremann   Décomposition pixelisée 25. Mai 2020 zu  17:41
xXMaloXx   Décomposition pixelisée 25. Mai 2020 zu  17:34

 49 Übungen

Ergebnis Name Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide Encoding - ASCII 26% 46489 5 Xartrick 2
pas_valide Encoding - UU 21% 36684 5 g0uZ 1
pas_valide Hash - Message Digest 5 21% 37219 5 g0uZ 1
pas_valide Hash - SHA-2 11% 18983 5 koma 1
pas_valide Shift cipher 7% 11555 10 m31z0nyx 0
pas_valide Pixel Madness 6% 9124 15 Ryscrow 1
pas_valide ELF64 - PID encryption 3% 5031 15 Lu33Y 1
pas_valide File - PKZIP 4% 6848 15 g0uZ 0
pas_valide Monoalphabetic substitution - Caesar 5% 8732 15 Arod 0
pas_valide Known plaintext - XOR 3% 5295 20 Ryscrow 0
pas_valide Code - Pseudo Random Number Generator 2% 2023 20 Tosh 0
pas_valide File - Insecure storage 1 4% 5619 20 g0uZ 0
pas_valide Polyalphabetic substitution - Vigenère 4% 5889 20 Arod 0
pas_valide System - Android lock pattern 3% 3790 20 Silentd 0
pas_valide Transposition - Rail Fence 2% 3573 20 YellowS4 0
pas_valide AES - CBC - Bit-Flipping Attack 1% 548 25 Tie21 0
pas_valide AES - ECB 1% 1490 25 cez40 0
pas_valide LFSR - Known plaintext 1% 405 25 Brissouille 0
pas_valide RSA - Factorisation 2% 2474 25 HacKSpider 0
pas_valide RSA - Decipher Oracle 1% 771 25 Zweisamkeit 0
pas_valide Service - Timing attack 1% 1683 25 g0uZ, koma 1
pas_valide Monoalphabetic substitution - Polybe 2% 2053 25 koma 0
pas_valide Initialisation Vector 1% 1117 25 manticore, notfound404 0
pas_valide GEDEFU 1% 367 30 makhno 0
pas_valide RSA - Corrupted key 1 1% 186 30 blackndoor 0
pas_valide RSA - Continued fractions 1% 843 30 sambecks 0
pas_valide RSA - Common modulus 1% 863 30 franb 0
pas_valide Service - Hash length extension attack 1% 537 30 koma 0
pas_valide AES - 4 Rounds 1% 138 35 Cryptanalyse 0
pas_valide ECDSA - Introduction 1% 107 35 Jrmbt 0
pas_valide RSA - Padding 1% 156 35 Tosh 0
pas_valide RSA - Signature 1% 48 35 s4r 0
pas_valide AES128 - CTR 1% 442 40 Tosh 0
pas_valide Discrete logarithm problem 1% 600 40 Thanat0s, RFC4949 0
pas_valide RSA - Corrupted key 2 1% 128 40 blackndoor 0
pas_valide RSA - Corrupted key 3 1% 63 40 blackndoor 0
pas_valide RSA - Multiple recipients 1% 743 40 franb 0
pas_valide AES - Fault attack #1 1% 74 50 Cryptanalyse 0
pas_valide Enigma Machine 1% 127 50 peyman 0
pas_valide ECDHE 1% 136 60 Tosh 0
pas_valide RSA - Lee cooper 1% 51 60 blackndoor, Synacktiv 0
pas_valide Service - CBC Padding 1% 755 60 koma 0
pas_valide Polyalphabetic substitution - One Time Pad 1% 277 60 Thanat0s 0
pas_valide White-Box Cryptography 1% 99 60 Cryptanalyse 0
pas_valide AES - Weaker variant 1% 44 70 Cryptanalyse 0
pas_valide Hash - SHA-3 1% 73 75 Revenger 0
pas_valide AES - Fault attack #2 1% 52 80 Cryptanalyse 0
pas_valide AES-PMAC 1% 11 100 Cryptanalyse 0
pas_valide ECDSA - Implementation error 1% 18 100 Tosh 0