25.9.12
This website uses cookies to ensure you get the best experience on our website. Learn more

Black Hat Cryptography - Attacks, Tools & Techniques for Security Professionals [2115]

Wolfgang Riedel

Crypto related vulnerabilities are super common! OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, lets face it: Nobody knows how cryptography works.

This course turns you into a powerful weapon. It will teach you how applied cryptography is commonly misused in the field and how this leads to exploitable bugs. Using case studies
from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.

During the course you'll:

- understand how modern cryptography works
- find common crypto vulnerabilities in real software
- write crypto exploits for real software (and an IoT device)

At the end of the course you'll be able to spot an exploitable crypto bug from miles away (and be able to avoid them yourself)! No prior knowledge required.

Skills / Knowledge

  • PenTesting
  • Crypto

Issued on

April 2, 2025

Expires on

Does not expire
Job Insights

These are the most common job titles and employers with the most open positions related to this credential.

Top job titles related to this credential
Top Employers
0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0 Jobs General Dynamics Information Technology General Dynamics Information Technology
0.0 0.0 0.2 0.2 0.4 0.4 0.6 0.6 0.8 0.8 1.0 1.0 Jobs
Legend
  • General Dynamics Information Technology