Cryptography Attacks
Course Description
Cryptography is often implemented incorrectly. Learn to identify and exploit cryptographic vulnerabilities in real applications.
Learning Objectives
- Understand cryptographic primitives
- Identify weak implementations
- Exploit padding oracle vulnerabilities
- Attack weak random number generators
- Break custom cryptography
- Analyze TLS/SSL vulnerabilities
Course Structure
Modules
Module 1: Cryptography Fundamentals (6h)
- Symmetric encryption
- Asymmetric encryption
- Hash functions
- Digital signatures
- Key exchange
Module 2: Symmetric Attacks (7h)
- ECB mode attacks
- CBC bit flipping
- Padding oracle attacks
- Key reuse vulnerabilities
Module 3: Asymmetric Attacks (6h)
- RSA vulnerabilities
- Small exponent attacks
- Factorization attacks
- Bleichenbacher attacks
Module 4: Hash Attacks (5h)
- Length extension attacks
- Hash collision exploitation
- Rainbow table attacks
- Password cracking
Module 5: Random Number Attacks (5h)
- PRNG weaknesses
- Seed prediction
- State recovery
- Entropy analysis
Module 6: TLS/SSL Attacks (6h)
- BEAST/CRIME/BREACH
- Heartbleed
- POODLE
- ROBOT attack
- Certificate attacks
Module 7: Protocol Attacks (5h)
- Replay attacks
- Man-in-the-middle
- Downgrade attacks
- Key exchange flaws
Module 8: Custom Crypto (5h)
- Identifying custom crypto
- Analysis techniques
- Common mistakes
- Breaking weak schemes
Tools
| Tool | Purpose |
|---|---|
| Hashcat | Password cracking |
| CyberChef | Crypto operations |
| OpenSSL | TLS testing |
| testssl.sh | TLS scanner |
| PadBuster | Padding oracle |
📄️ Overview
Cryptographic vulnerability exploitation: padding oracles, weak implementations, and crypto analysis