Description How to write adavanced port scanner in python Video Code import socket import re from termcolor import colored import optparse from threading import * def portscanner(host, port...
Inroduction InsomniHack Teaser CTF 2018 - Rule86 Description Kevin is working on a new synchronous stream cipher, but he has been re-using his key. In this challenge, you are provided with ...
Inroduction RITSEC CTF 2018 - CictroHash Description For this challenge you must implement the described Hash Function and then find a collision of two strings. Once a collision is found sen...
Inroduction TAMU CTF 2018 - LarryCrypt Description A binary executable called larrycrypt was provided. ./larrycrypt -R 4 -K “V3c70R” flag Writeup We tried some input for the larrycrypt bi...
Inroduction TAMU CTF 2018 - SimpleDES Description Larry is working on an encryption algorithm based on DES. He hasn’t worked out all the kinks yet, but he thinks it works. Your job is to con...
Inroduction CodeBlue CTF 2017 - Common Modulus 1,2,3 Description Common Modulus 1: Simple Common Modulus Attack Common Modulus 2: Common Modulus Attack with common exponent divisor Common Mo...
Inroduction Qiwi-Infosec - Crypto 400_1 based on Coppersmith’s attack. Description Message m has been encrypted by RSA with exponent e=3 for three users. Users have been used different modul...
Inroduction Qiwi-Infosec - Crypto 300_1 shared key in decimal. Description Alice, Bob, and Cameron want to get shared key by Diffie-Hellman method. Their public keys respectively are g^a mod...
Inroduction Qiwi-Infosec - Crypto 100_1 cipher text need to be decoded to read the secret message . Description We got a cipher text that was five lines long and consisted of underscores and...
Inroduction Cyber Talents - training reverse engineering ahram canadian competition. Description x64 stripped linux binary file given file called training with description of “ training, kee...
A new version of content is available.