to generate precise sha1 keys. He used only one function from it.
@LiEnby6 жыл бұрын
another xor vuln is simply to get two strings encrypted with the same key then ciphertext3 = ciphertext1 xor ciphertext2 now you can just do ciphertext3 xor ciphertext1 and you get the plaintext. which ofc you can just then do plaintext xor ciphertext1 and ya got the key :)