To access material, start machines and answer questions login.
Encryption allows us to keep data safe both when it is stored and when it is being transmitted. However, encryption can be implemented insecurely or incorrectly, leading to significant security issues. One example is using legacy cipher modes, such as electronic codebook (ECB). In this room, we will dive into the world of symmetric encryption, code books, and cipher modes to uncover exactly what can go wrong with using ECB and how you can perform practical exploitation if you encounter it!
Learning Objectives
Throughout this room, you will gain more knowledge on the following concepts:
- Symmetric encryption
- Cipher code books
- Electronic codebook (ECB) cipher mode
- Exploiting ECB implementations by performing chosen plaintext attacks (CPA)
- Mitigation and best practices
Learning Prerequisites
Connecting to the Machine
You can start the virtual machine by clicking the Start Machine button below. Either use the AttackBox by pressing the Start Attackbox button on top of the page or use the connection to access the target machine. Before starting the exercise, please wait 1-2 minutes after the system boots completely.
Ready to learn Cyber Security?
The Attacking ECB Oracles room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
