Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Attacking ECB Oracles

Premium room

Learn about the electronic codebook (ECB) cipher mode and how to exploit its weaknesses.

hard

120 min

3,021

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Encryption allows us to keep data safe both when it is stored and when it is being transmitted. However, encryption can be implemented insecurely or incorrectly, leading to significant security issues. One example is using legacy cipher modes, such as electronic codebook (ECB). In this room, we will dive into the world of symmetric encryption, code books, and cipher modes to uncover exactly what can go wrong with using ECB and how you can perform practical exploitation if you encounter it!

Learning Objectives

Throughout this room, you will gain more knowledge on the following concepts:

  • Symmetric encryption
  • Cipher code books
  • Electronic codebook (ECB) cipher mode
  • Exploiting ECB implementations by performing chosen plaintext attacks (CPA)
  • Mitigation and best practices

Learning Prerequisites

Connecting to the Machine

You can start the virtual machine by clicking the Start Machine button below. Either use the AttackBox by pressing the Start Attackbox button on top of the page or use the connection to access the target machine. Before starting the exercise, please wait 1-2 minutes after the system boots completely.

Answer the questions below
I am ready to learn about ECB and how to exploit it!