Breaking my Security Assignments

37 points by zk


tonyarkles

One of my regrets from taking Computer Security in undergrad was that I had figured out a plan to steal one of the CTF boxes and bring it to class but I chickened out. Using traceroute I had figured out which floor of the computer science building it was in, and then I figured out how to wake up the screen over Remote Desktop. I could see it on the other side of a window in a room. I was friends with most of the janitorial staff; I was the president of the student society and often enough locked myself out of private study rooms or meeting rooms, and they were pretty generous about helping out if that happened.

Mostly I didn’t do it because I didn’t want the janitors to get in trouble for helping me steal it. But man… it would have been the funniest thing.

tuxes

Fun story.

That crypto scheme looks fishy. With just plain AES (and no integrity, e.g. HMAC or GCM), then if you have a valid token for Ex11, you can craft a valid token for any other exercise (say, Ex12) by incrementing the corresponding byte in the ciphertext. That will decrypt to “Ex12” just fine.

Partly this depends on which block mode your Java security provider chooses for the underspecified “Cipher.getInstance(“AES”)”.

See more: