O'Reilly logo

Kali Linux CTF Blueprints by Cameron Buchanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scenario 3 – RC4, my god, what are you doing?

RC4 was an encryption method briefly in vogue for its speed and simplicity. Anyone who designs or implements cryptography will know that those are two words that, while good when applied with other words, such as secure, thoroughly tested, and 300 rounds, are not great when they make up the core of a description.

RC4 can simply be described as PT XOR key = CT, the explanation to which is as follows:

  • PT is your plaintext value
  • Key is the secret value set to encrypt the values
  • CT is the encrypted cipher text

XOR is exclusive or or bitwise addition, which is where two values are broken down into binary, overlayed, and where the numbers match, a 0 is returned, and where the numbers don't match, a 1 is given. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required