cryptoPromedium
AliEnS Challenge Scenario
HackTheBox
Task: attack an AES-ECB oracle with custom string padding and a fresh random key for every request. Solution: exploit the Unicode-versus-UTF-8 length mismatch to shift byte alignment, then recover the appended flag with same-request ECB block equality matching against a dictionary of candidate blocks.
$ ls tags/ techniques/
same_request_ecb_block_matchingunicode_utf8_length_mismatch_abusemultibyte_alignment_shiftbyte_at_a_time_flag_recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][free]xorxorxor— hackthebox
- [crypto][Pro]Rhome— HackTheBox
- [crypto][Pro]Enigma— hackerlab
- [crypto][Pro]Strange DES— spbctf
- [reverse][Pro]Simple Encryptor— hackthebox