Home
Razzk
Cancel

Python in Cybersecurity - Advanced Port Scanner - Scan & Defense In Depth

Description Advanced Port Scanner - Scan & Defense In Depth All type of tcp scans, banner graping, udp scans, craft tcp packet, thread pool Video Code from scapy.layers.inet import IP,TCP,...

Python in Cybersecurity - Port Scanner

Description How to write adavanced port scanner in python Video Code import socket import re from termcolor import colored import optparse from threading import * def portscanner(host, port...

InsomniHackTeaser Crypto 18 - Rule86

Inroduction InsomniHack Teaser CTF 2018 - Rule86 Description Kevin is working on a new synchronous stream cipher, but he has been re-using his key. In this challenge, you are provided with ...

RITSEC Crypto 18 - CictroHash

Inroduction RITSEC CTF 2018 - CictroHash Description For this challenge you must implement the described Hash Function and then find a collision of two strings. Once a collision is found sen...

TAMU Crypto 18 - LarryCrypt

Inroduction TAMU CTF 2018 - LarryCrypt Description A binary executable called larrycrypt was provided. ./larrycrypt -R 4 -K “V3c70R” flag Writeup We tried some input for the larrycrypt bi...

TAMU Crypto 18 - SimpleDES

Inroduction TAMU CTF 2018 - SimpleDES Description Larry is working on an encryption algorithm based on DES. He hasn’t worked out all the kinks yet, but he thinks it works. Your job is to con...

CodeBlue Crypto 17 - Common Modulus 1,2,3

Inroduction CodeBlue CTF 2017 - Common Modulus 1,2,3 Description Common Modulus 1: Simple Common Modulus Attack Common Modulus 2: Common Modulus Attack with common exponent divisor Common Mo...

QIWI - Crypto 400_1

Inroduction Qiwi-Infosec - Crypto 400_1 based on Coppersmith’s attack. Description Message m has been encrypted by RSA with exponent e=3 for three users. Users have been used different modul...

QIWI - Crypto 300_1

Inroduction Qiwi-Infosec - Crypto 300_1 shared key in decimal. Description Alice, Bob, and Cameron want to get shared key by Diffie-Hellman method. Their public keys respectively are g^a mod...

QIWI - Crypto 100_1

Inroduction Qiwi-Infosec - Crypto 100_1 cipher text need to be decoded to read the secret message . Description We got a cipher text that was five lines long and consisted of underscores and...