|
You are here |
www.cryptofails.com | ||
| | | | |
notsosecure.com
|
|
| | | | | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption. | |
| | | | |
paragonie.com
|
|
| | | | | A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP | |
| | | | |
www.daemonology.net
|
|
| | | | | ||
| | | | |
blog.jitendrapatro.me
|
|
| | | |||