logo
Red wilds
Crypto-attack runbooks
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
    • Through: Where the raccoons burrow and rummage
      • The art of staying where you are not wanted
      • Overflowing the bin on purpose
      • Reverse engineering
      • Steganography
      • Crypto-attacks
        • Field notes from the bin-raider’s handbook
        • Crypto-attack runbooks
          • Padding oracle exploitation
          • TLS misconfiguration assessment
          • Kerberoasting and AS-REP roasting
          • JWT attack techniques
          • RNG quality assessment
        • Crypto-attack runbooks
          • Padding oracle exploitation
          • TLS misconfiguration assessment
          • Kerberoasting and AS-REP roasting
          • JWT attack techniques
          • RNG quality assessment
        • Picking the locks of logic
      • Slipping through the cracks
    • Out: Where squirrels swipe the crown jewels

    Crypto-attack runbooks¶

    Step-by-step engagement runbooks for cryptographic attack scenarios.

    Runbooks

    • Padding oracle exploitation
    • TLS misconfiguration assessment
    • Kerberoasting and AS-REP roasting
    • JWT attack techniques
    • RNG quality assessment
    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7