cryptomedium

AliEnS Challenge Scenario

HackTheBox

Task: attack an AES-ECB oracle with custom string padding and a fresh random key for every request. Solution: exploit the Unicode-versus-UTF-8 length mismatch to shift byte alignment, then recover the appended flag with same-request ECB block equality matching against a dictionary of candidate blocks.

$ ls tags/ techniques/
same_request_ecb_block_matchingunicode_utf8_length_mismatch_abusemultibyte_alignment_shiftbyte_at_a_time_flag_recovery

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]