SPIDER1CODE
1.9K subscribers
130 photos
22 videos
12 files
81 links
Spider1Code is the first Arab community that brings together cybersecurity artificial intelligence, and more โœจ๐Ÿค
Download Telegram
All my certificates in 2025 ๐Ÿค

ุนุงู… ุฌุฏูŠุฏ ุณุนูŠุฏ ู„ูƒู… ูˆ ุจ ุงุฐู† ุงู„ู„ู‡ ู…ู† ุชุทูˆุฑ ู„ูŠ ุชุทูˆุฑ ู„ู†ุง ุฌู…ูŠุนุง ๐Ÿค
โค4
๐Ÿ‘Œ๐Ÿป๐Ÿค
โค6
ุจุนุฏ ู…ุง ุฑุงุฌุนุช ูˆ ุงุชุงูƒุฏ ุงุชุนู„ู…ุช ุญุงุฌู‡ ุฌุฏูŠุฏู‡ ุงู†ูŠ ู…ุด ุงุณุชุนุฌู„ ุนู„ูŠ ุงู„ุญุงุฌู‡

ุตุญูŠุญ ุดูƒู„ู‡ุง ูŠุจุงู† ุงู†ู‡ุง ูุนู„ุง xss ุจุณ ุงู„ุญู‚ูŠู‚ู‡ ู„ุง ูˆ ู‡ุฑุจุท ู…ู‚ูˆู„ู‡ ุฏูŠ ุจูƒู„ ุดุฆ

ุทู„ู…ุง ู…ููŠุด impact ู…ููŠุด Vulnerability


ุงู„ุนูŠุจ ู…ุด ูู„ ุบู„ุท ุงู„ุนูŠุจ ุงู†ูŠ ุงุตุญุญ ุงู„ุบู„ุท ูˆ ุงู„ู…ุฑู‡ ุงู„ุฌุงูŠู‡ ู‡ุชุงูƒุฏ ู…ูŠุช ู…ุฑู‡ ูˆ ุดูƒุฑุง ู„ูƒู„ ูˆุงุญุฏ ู‚ุงู„ูŠ ูƒู„ู…ู‡ ูƒูˆูŠุณู‡ ูˆ ุดูƒุฑุง ุจุฑุฏูˆ ุงู„ูŠ ู‚ู„ูŠ ูƒู„ู…ู‡ ูˆุญุดู‡

ู ู„ุงุชู†ูŠู† ุงู†ุง ุงุชุนู„ู…ุช ูˆ ุงุณุชูุฏุช

ูˆ ุงู†ุช ุงูƒูŠุฏ ูŠู„ูŠ ุจุชู‚ุฑุงุก ุงุณุชูุฏุช ู…ู† ุงู„ู…ูˆู‚ู ุฏุง ูˆ ุงุดูˆููƒู… ุนู„ู‰ ุฎูŠุฑ ๐ŸคโœŒ๐Ÿป
โค3
๐Ÿšฉ New CTF Writeup โ€“ Breizh CTF


Iโ€™ve just published a technical writeup for the Authentification challenge from Breizh CTF, focusing on a flawed implementation of AES-GCM at the counter management level.


This is not just about โ€œnonce reuse is badโ€.


The writeup walks through how :


Misusing the Jโ‚€ counter


Breaks both confidentiality and integrity
Allows recovery of the GHASH key (H)


And enables full forgery of a valid admin token


The goal was to explain why this class of bugs is terminal in AEAD schemes, not just how to exploit it.


๐Ÿ”— Full writeup on Medium :


https://spider1sec.medium.com/breizh-ctf-authentification-9707750140bc


#BreizhCTF #CTF #Cryptography #AESGCM #CyberSecurity #InfoSec #Writeup #Medium
โค1
Quo vadis? โ€” ECSC 2024 (Italy)

I recently solved โ€œQuo vadis?โ€, a cryptography challenge from ECSC 2024 (Italy), published on CryptoHack.
The challenge was solved by only 8 participants, and I also wrote a full technical write-up explaining the solution in depth.

What made this challenge special wasnโ€™t implementation difficulty, but the core idea :

Working with Galois Rings rather than common finite fields
Exploiting isomorphisms between different ring constructions
Reducing the problem to linear algebra over โ„ค / 2แตโ„ค
Using Newton lifting to move solutions across ring levels

This was a reminder that advanced crypto CTFs are often less about tools, and more about mathematical understanding and clean reasoning.

I shared a detailed write-up covering:

The mathematical insight behind the challenge

The full solving strategy

Implementation details in Sage


๐Ÿ”— Write-up :

https://spider1sec.medium.com/quo-vadis-ecsc-2024-italy-cryptohack-70cd091be2b8

#Cryptography #AppliedCryptography #Mathematics
โค5
This media is not supported in your browser
VIEW IN TELEGRAM
ุงู†ุง ูˆ ุงูˆู„ ู‡ูƒุฑ ุนุฑูุชูˆ ู ุญูŠุงุชูŠ
โค3
ู†ุนู…ู„ ุจุซ ุงุณุงู„ู‡ ุŸ
Anonymous Poll
83%
ุงูƒูŠุฏ
17%
ู„ุง
broadcast questions ?
Anonymous Poll
86%
Yes
14%
No
ุงู„ุจุซ ูŠูˆู… ุงู„ุฌู…ุนู‡ ุงู„ุฌุงูŠู‡ ๐Ÿค

The broadcast will be at the end of the week ๐Ÿค
โค1
Solved Wonky AES cryptography challenge on Hack The Box ๐Ÿ”

The challenge involved an AES implementation with an intentional fault injection during encryption.

By analyzing the source code and

applying Differential Fault Analysis (DFA)

I was able to :

Recover the AES round-10 key

Reverse the AES key schedule

Decrypt the encrypted flag successfully
This challenge was a great reminder that cryptography breaks often come from implementation flaws, not the algorithm itself.

Full write-up ๐Ÿ‘‡

https://spider1sec.medium.com/hackthebox-wonky-aes-1c94e0f94666

#CTF #Cryptography #HackTheBox #CyberSecurity #AES
โค2