Skip to content

NotSoSecure/ecdsa-nonce-reuse-attack-playground

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ECDSA Nonce Reuse Attack - Playground

Challenge is to extract the content of /etc/passwd

Build and run docker

sudo docker build -t ecdsa-nonce-reuse-playground . 
sudo docker run -it -p 5000:5000 ecdsa-nonce-reuse-playground

Access

http://localhost:5000

To run exploit - install pre-requisite

pip3 install -r requirement.txt

Run exploit - to generate signature for /etc/paaswd

python3 exploit.py

Reference:

About

ECDSA Nonce Reuse Attack Playground application

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published