Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

CTF比赛,VxWorks弱hash算法,密码碰撞解析

Notifications You must be signed in to change notification settings

Eziodeng/ctf_vxworks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

6 Commits

Repository files navigation

ctf_vxworks

VxWorks弱hash算法碰撞
该实验主要完成了两件事:

  1. 通过编写程序获得长度为10的总计100万个随机密码的密码本;
  2. 通过编写程序使用密码本中密码碰撞出相同hash值的密码key值。

实验环境
Ubuntu 16.04 64位

代码说明
10pass.sh 随机生成长度为10的密码本
运行方式: ./10pass.sh > 1.txt
guesshash.c 碰撞hash值程序
编译方式: gcc -o guesshash ./guesshash.c
运行方式:./guesshash

参考文章
http://www.freebuf.com/vuls/177036.html

About

CTF比赛,VxWorks弱hash算法,密码碰撞解析

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 86.9%
  • Shell 13.1%

AltStyle によって変換されたページ (->オリジナル) /