Saltar al contenido principal

Cryptography Attacks

45 hours 8 Modules 20+ Labs Advanced

Course Description

Cryptography is often implemented incorrectly. Learn to identify and exploit cryptographic vulnerabilities in real applications.


Learning Objectives

  1. Understand cryptographic primitives
  2. Identify weak implementations
  3. Exploit padding oracle vulnerabilities
  4. Attack weak random number generators
  5. Break custom cryptography
  6. Analyze TLS/SSL vulnerabilities

Course Structure


Modules

Module 1: Cryptography Fundamentals (6h)

  • Symmetric encryption
  • Asymmetric encryption
  • Hash functions
  • Digital signatures
  • Key exchange

Module 2: Symmetric Attacks (7h)

  • ECB mode attacks
  • CBC bit flipping
  • Padding oracle attacks
  • Key reuse vulnerabilities

Module 3: Asymmetric Attacks (6h)

  • RSA vulnerabilities
  • Small exponent attacks
  • Factorization attacks
  • Bleichenbacher attacks

Module 4: Hash Attacks (5h)

  • Length extension attacks
  • Hash collision exploitation
  • Rainbow table attacks
  • Password cracking

Module 5: Random Number Attacks (5h)

  • PRNG weaknesses
  • Seed prediction
  • State recovery
  • Entropy analysis

Module 6: TLS/SSL Attacks (6h)

  • BEAST/CRIME/BREACH
  • Heartbleed
  • POODLE
  • ROBOT attack
  • Certificate attacks

Module 7: Protocol Attacks (5h)

  • Replay attacks
  • Man-in-the-middle
  • Downgrade attacks
  • Key exchange flaws

Module 8: Custom Crypto (5h)

  • Identifying custom crypto
  • Analysis techniques
  • Common mistakes
  • Breaking weak schemes

Tools

ToolPurpose
HashcatPassword cracking
CyberChefCrypto operations
OpenSSLTLS testing
testssl.shTLS scanner
PadBusterPadding oracle