Skip to content

Commit da9f6b2

Browse files
committed
Fix typos
1 parent 488812f commit da9f6b2

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

trainingportal/static/lessons/cryptoBreaker/crypto_analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The golden key is wrapped in several layers of encoding so you will need to reco
3434
- HTTP is a well known communication protocol, there are many common words. Request lines for HTTP messages that send data often look like this: `POST / HTTP/1.1\r\n`
3535
- In one of the previous lessons you've decrypted a key using the plain text and the cipher. That should point you to what algorithm is being used.
3636

37-
**NOTE: If you decide to use the Solution, open the Solution as a new tab or Window so you don't reset the cipher.**
37+
**NOTE: If you decide to use the solution, open the solution as a new tab or window so you don't reset the cipher.**
3838

3939
#### References
4040

trainingportal/static/lessons/cryptoBreaker/crypto_analysis.sol.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Using an online tool generate a PBKDF2 key using the parameters associated with
110110
For our example:
111111

112112
Password: VIVAMUS LOREM DICTUM AUGUE CURSUS EROS MORBI TORTOR LIBERO LIBERO
113-
Algortithm: SHA256
113+
Algorithm: SHA256
114114
Salt: VIVAMUS
115115
Iterations: 1000
116116

trainingportal/static/lessons/cryptoBreaker/crypto_caesar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Here are a few recommendations:
1414

1515
You may also use your programming/scripting language of choice.
1616

17-
**NOTE: If you decide to view the Solution, open the Solution as a new tab or Window so you don't reset the cipher.**
17+
**NOTE: If you decide to view the solution, open the solution as a new tab or window so you don't reset the cipher.**
1818

1919
`Important Note: You're allowed to conduct offline brute force attacks, however trying answer combinations in an automatic fashion using the portal is strictly forbidden.`
2020

trainingportal/static/lessons/cryptoBreaker/crypto_pbk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ A PBK is as strong as the arguments given to the derivation function. If someone
5757

5858
If the salt is known to the attacker that also makes the password easier to crack. In the case of WPA2 the ssid is broadcasted and visible to all your neighbours.
5959

60-
Using a weak hashing algorithm may allow collisions, although the attacker would need to know the final key for the collision vulnerabilities to com into play. The bigger concern is that some algorithms such as MD5 may impose a shorter length key (16 bytes). A shorter key is easier to crack and increases the avenues for cyptanalysis.
60+
Using a weak hashing algorithm may allow collisions, although the attacker would need to know the final key for the collision vulnerabilities to come into play. The bigger concern is that some algorithms such as MD5 may impose a shorter length key (16 bytes). A shorter key is easier to crack and increases the avenues for cyptanalysis.
6161

6262

6363
#### References

0 commit comments

Comments
 (0)