reversemedium
Wayback
hackthebox
Task: Recover password from time-seeded PRNG generator to decrypt AES-CBC blob. Solution: Bruteforce 172K possible seeds (2-day range), replicate glibc rand() in Docker, use PKCS7 padding as decryption oracle.
$ ls tags/ techniques/
static_reverse_engineeringaes_cbc_decryptionprng_seed_bruteforceinteger_overflow_arithmetic
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]