Bumped
#233
OP 19 April, 2024 - 10:40 AM
This is a bump
This post is by a banned member (jigsaw11) - Unhide
Bumped
#233
OP 19 April, 2024 - 10:40 AM
This is a bump
This post is by a banned member (jigsaw11) - Unhide
Bumped
#234
OP 21 April, 2024 - 02:46 AM
This is a bump
This post is by a banned member (jigsaw11) - Unhide
Bumped
#235
OP 22 April, 2024 - 12:11 PM
This is a bump
This post is by a banned member (jigsaw11) - Unhide
Bumped
#236
OP 23 April, 2024 - 03:55 PM
This is a bump
This post is by a banned member (angelbanker) - Unhide
10 May, 2024 - 07:56 PM
AES is very resistant to attacks, but if the ransomware is .net based and not obfuscated, experts will use a side-channel attack in the analysis.
These attacks are based on analyzing side-channel information such as transaction execution time or power consumption to extract the secret key. Although it depends on how and where you store the private and secret key aes Let's say LockBit stored it in the registry , which served to write decrypter. And I wonder if you have some combination of algorithms, or selective encryption? There is strip encryption, this type of encryption divides the file into several blocks and encrypts each block separately, it works in a combination of two algorithms. |
Create an account or sign in to comment | ||
You need to be a member in order to leave a comment | ||
Create an account
Sign up for a new account in our community. It's easy!
|
or |
Sign in
Already have an account? Sign in here.
|