reversemedium

Wayback

hackthebox

Task: Recover password from time-seeded PRNG generator to decrypt AES-CBC blob. Solution: Bruteforce 172K possible seeds (2-day range), replicate glibc rand() in Docker, use PKCS7 padding as decryption oracle.

$ ls tags/ techniques/
static_reverse_engineeringaes_cbc_decryptionprng_seed_bruteforceinteger_overflow_arithmetic

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]