• Breaking News

    Friday, April 26, 2019

    Cryptography Known-plaintext BF-ecb file edit - Uni Assignment

    Cryptography Known-plaintext BF-ecb file edit - Uni Assignment


    Known-plaintext BF-ecb file edit - Uni Assignment

    Posted: 25 Apr 2019 03:17 PM PDT

    So I'm doing a first year Cybersecurity fundamentals paper and we have our first assignment. I've finished all questions bar this one in particular and need some push in the right direction.

    We have a small "payroll/ann salary" file that we need to edit. And make "our" salary equal to the higher salaries.

    We know employee names, know the length of each line, and also that it is sorted alphabetically.

    After quite a bit of reading I'm concluding that I'm stumped. After decryption I still don't have the key to re-encrypt, editing the file will change its hash, making it obvious that it has been edited.

    What are the typical steps to approach something like this? Is there any appropriate documents that would be of help?

    Thanks

    submitted by /u/Kiwitheme
    [link] [comments]

    Possible for a client to verify software running on server?

    Posted: 25 Apr 2019 07:36 AM PDT

    Sorry if this has already been asked, I tried searching and didn't find any results.

    Imagine there was a software service that open sourced its code. Is there any mechanism that clients could use to verify that the server was running the software it claimed? Like a hash of some sort included in the response to the client?

    submitted by /u/2swole2control
    [link] [comments]

    Cracking /etc/shadow

    Posted: 25 Apr 2019 04:39 PM PDT

    Is it possible to crack shadow file in which root password is stored for Linux?

    submitted by /u/sajaljain_syd
    [link] [comments]

    No comments:

    Post a Comment