logo
Red team
CBC Bit-flipping attack
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
          • Field notes from the bin-raider’s handbook
          • Where the raccoon picks the locks of logic
            • Old tricks, new treats: Unmasking classical ciphers
            • The raccoon’s secret recipes for digital mischief
            • CBC Bit-flipping attack
            • AES Electronic code book
            • Initialisation vector
            • Riding the currents: Stream cipher exploits
            • Breaking the seal: Hash function vulnerabilities
            • Unlocking RSA: Asymmetric mischief
            • The Raccoon’s curiosity cabinet
            • Curves ahead: Navigating elliptic curve cryptography
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels

    CBC Bit-flipping attack¶

    RootMe Challenge: Flip it: An elite hacker team is sharing tools. Some tools seem interesting, but you need to join their team to access them.

    bit_flipping_attack.py

    • The Block Cipher SQUARE - Daemen, Knudsen, Rijmen

    • SANS Institute AES CBC Bit Flipping


    Last update: 2025-05-12 14:16
    Back to top
    Previous <no title>
    Next AES Electronic code book
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7