<-- Prev

Public-Key Cryptography

Next -->
  • Export-grade
    100 pts · 2979 Solves · 14 Solutions
    Alice and Bob are using legacy codebases and need to negotiate parameters they both support. You've man-in-the-middled this negotiation step, and can passively observe thereafter. How are you going to ruin their day this time?

    Connect at socket.cryptohack.org 13379

    You must be logged in to submit your flag.


Level Up

level up icon

You are now level Current level