Hacking Knowledge
Ctrlk
  • πŸ β€‹ Homepage
    • Welcome
    • About Me
    • Disclaimer
    • Conventions
  • πŸ”‘Cybersecurity Basics
    • Introduction
    • Vulnerabilities
    • Cyberattacks
    • Security Models
    • Secure Design
    • Legal Support
    • Career Paths
    • Certifications
    • Related Concepts
  • 🐧Linux
    • Introduction
    • Functional Structure
    • Commands
    • Useful Shell Resources
    • Related Concepts
  • ⊞ Windows
    • Introduction
    • Functional Structure
    • Commands
    • Related Concepts
  • 🌐Networks
    • Introduction
    • Networking Frameworks
    • Protocols
    • Hypervisors
    • Related Concepts
    • Tools and Utilities
  • πŸ”Cryptography
    • Introduction
    • Fundamental Concepts
    • Attack Techniques (WIP)
      • XOR Attacks
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 🎯Penetration Testing
    • Introduction
    • Pentesting vs Bug Bounty vs Red Teaming
    • Categorization
    • Process Stages
    • Related Concepts
  • πŸ“‘Web Exploitation
    • Introduction
    • Fundamentals
    • OWASP Top 10
    • HTTP Security Considerations (WIP)
    • Web Vulnerabilities
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • πŸ—„οΈDatabase Attacks
    • Introduction
    • SQL
    • NoSQL
    • Attack Techniques
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • πŸ‘₯Active Directory Hacking
    • Introduction
    • Fundamentals
    • Related Concepts
    • Tools and Utilities (WIP)
    • Useful Tips (WIP)
  • ☁️CLOUD HACKING
    • Introduction
    • Related Concepts
    • Tools and Utilities (WIP)
    • Useful Tips (WIP)
  • πŸ‘£Digital Forensics
    • Introduction
    • Basic Plan
    • Related Concepts
    • Tools and Utilities
    • Useful Tips
  • 🚩Practical Skill Development
    • Learning Platforms
    • Featured Labs
    • CTF Competitions
  • πŸ“Write-Ups
    • Introduction
    • HTB Starting Point
    • HTB Machines
    • HTB Challenges
    • HTB Advanced labs
Powered by GitBook
On this page
  1. πŸ”Cryptography

Attack Techniques (WIP)

XOR Attacks
PreviousEliptic Curve Cryptography (ECC) (WIP)NextXOR Attacks