cryptomedium
AliEnS Challenge Scenario
HackTheBox
Task: attack an AES-ECB oracle with custom string padding and a fresh random key for every request. Solution: exploit the Unicode-versus-UTF-8 length mismatch to shift byte alignment, then recover the appended flag with same-request ECB block equality matching against a dictionary of candidate blocks.
$ ls tags/ techniques/
same_request_ecb_block_matchingunicode_utf8_length_mismatch_abusemultibyte_alignment_shiftbyte_at_a_time_flag_recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]