cryptoPromedium
Enigma
hackerlab
Task: 100 XOR-encrypted messages with 64-bit key, known plaintext prefix "Hello Alice". Solution: Many-Time Pad attack - recovered key using known plaintext XOR, decrypted all messages to find real flag among 99 fakes.
$ ls tags/ techniques/
Many-Time Pad AttackKnown Plaintext Attack (KPA)XOR Key Recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][free]xorxorxor— hackthebox
- [crypto][Pro]Поврежденная расшифровка (Corrupted Decryption)— hackerlab
- [crypto][Pro]Забытый (Forgotten)— hackerlab
- [forensics][Pro]Secure Random (Безопасный рандом)— HackerLab
- [crypto][Pro]Напиши мне— hackerlab