Google CTF – Wolf Spider (Crypto 125)

Continuing on from Eucalypt Forest – can you break Message Authentication in Wolf Spider Summary: forging signatures by exploiting CBC padding oracle and hash length extenstion


Olympic CTF 2014 GuessGame (300)

Be careful, it’s cheating! nc 3126 Summary: discrete logarithm with group oracle

26 2012 CTF Challenge #3 (450)

3 – Zombies like PPTP Our intel shows us that the Zombies use a MS-PPTP like protocol and luckily we could intercept a challenge-response transmission of one of the Zombie outposts. The important thing for Zombies in this war is mass! Not only brain mass but their mass. So they built their PPTP protocol compatible… Continue reading »