Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
paul-ion committed Jan 13, 2025
1 parent 488812f commit da9f6b2
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ The golden key is wrapped in several layers of encoding so you will need to reco
- HTTP is a well known communication protocol, there are many common words. Request lines for HTTP messages that send data often look like this: `POST / HTTP/1.1\r\n`
- In one of the previous lessons you've decrypted a key using the plain text and the cipher. That should point you to what algorithm is being used.

**NOTE: If you decide to use the Solution, open the Solution as a new tab or Window so you don't reset the cipher.**
**NOTE: If you decide to use the solution, open the solution as a new tab or window so you don't reset the cipher.**

#### References

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ Using an online tool generate a PBKDF2 key using the parameters associated with
For our example:

Password: VIVAMUS LOREM DICTUM AUGUE CURSUS EROS MORBI TORTOR LIBERO LIBERO
Algortithm: SHA256
Algorithm: SHA256
Salt: VIVAMUS
Iterations: 1000

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Here are a few recommendations:

You may also use your programming/scripting language of choice.

**NOTE: If you decide to view the Solution, open the Solution as a new tab or Window so you don't reset the cipher.**
**NOTE: If you decide to view the solution, open the solution as a new tab or window so you don't reset the cipher.**

`Important Note: You're allowed to conduct offline brute force attacks, however trying answer combinations in an automatic fashion using the portal is strictly forbidden.`

Expand Down
2 changes: 1 addition & 1 deletion trainingportal/static/lessons/cryptoBreaker/crypto_pbk.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ A PBK is as strong as the arguments given to the derivation function. If someone

If the salt is known to the attacker that also makes the password easier to crack. In the case of WPA2 the ssid is broadcasted and visible to all your neighbours.

Using a weak hashing algorithm may allow collisions, although the attacker would need to know the final key for the collision vulnerabilities to com into play. The bigger concern is that some algorithms such as MD5 may impose a shorter length key (16 bytes). A shorter key is easier to crack and increases the avenues for cyptanalysis.
Using a weak hashing algorithm may allow collisions, although the attacker would need to know the final key for the collision vulnerabilities to come into play. The bigger concern is that some algorithms such as MD5 may impose a shorter length key (16 bytes). A shorter key is easier to crack and increases the avenues for cyptanalysis.


#### References
Expand Down

0 comments on commit da9f6b2

Please sign in to comment.