Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
crypto /
[ HOME SHELL ]
Name
Size
Permission
Action
aes
[ DIR ]
drwxr-xr-x
cipher
[ DIR ]
drwxr-xr-x
des
[ DIR ]
drwxr-xr-x
dsa
[ DIR ]
drwxr-xr-x
ecdsa
[ DIR ]
drwxr-xr-x
ed25519
[ DIR ]
drwxr-xr-x
elliptic
[ DIR ]
drwxr-xr-x
hmac
[ DIR ]
drwxr-xr-x
internal
[ DIR ]
drwxr-xr-x
md5
[ DIR ]
drwxr-xr-x
rand
[ DIR ]
drwxr-xr-x
rc4
[ DIR ]
drwxr-xr-x
rsa
[ DIR ]
drwxr-xr-x
sha1
[ DIR ]
drwxr-xr-x
sha256
[ DIR ]
drwxr-xr-x
sha512
[ DIR ]
drwxr-xr-x
subtle
[ DIR ]
drwxr-xr-x
tls
[ DIR ]
drwxr-xr-x
x509
[ DIR ]
drwxr-xr-x
crypto.go
5.31
KB
-rw-r--r--
issue21104_test.go
1.8
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : issue21104_test.go
// Copyright 2017 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package crypto import ( "crypto/aes" "crypto/cipher" "crypto/rc4" "testing" ) func TestRC4OutOfBoundsWrite(t *testing.T) { // This cipherText is encrypted "0123456789" cipherText := []byte{238, 41, 187, 114, 151, 2, 107, 13, 178, 63} cipher, err := rc4.NewCipher([]byte{0}) if err != nil { panic(err) } test(t, "RC4", cipherText, cipher.XORKeyStream) } func TestCTROutOfBoundsWrite(t *testing.T) { testBlock(t, "CTR", cipher.NewCTR) } func TestOFBOutOfBoundsWrite(t *testing.T) { testBlock(t, "OFB", cipher.NewOFB) } func TestCFBEncryptOutOfBoundsWrite(t *testing.T) { testBlock(t, "CFB Encrypt", cipher.NewCFBEncrypter) } func TestCFBDecryptOutOfBoundsWrite(t *testing.T) { testBlock(t, "CFB Decrypt", cipher.NewCFBDecrypter) } func testBlock(t *testing.T, name string, newCipher func(cipher.Block, []byte) cipher.Stream) { // This cipherText is encrypted "0123456789" cipherText := []byte{86, 216, 121, 231, 219, 191, 26, 12, 176, 117} var iv, key [16]byte block, err := aes.NewCipher(key[:]) if err != nil { panic(err) } stream := newCipher(block, iv[:]) test(t, name, cipherText, stream.XORKeyStream) } func test(t *testing.T, name string, cipherText []byte, xor func([]byte, []byte)) { want := "abcdefghij" plainText := []byte(want) shorterLen := len(cipherText) / 2 defer func() { err := recover() if err == nil { t.Errorf("%v XORKeyStream expected to panic on len(dst) < len(src), but didn't", name) } const plain = "0123456789" if plainText[shorterLen] == plain[shorterLen] { t.Errorf("%v XORKeyStream did out of bounds write, want %v, got %v", name, want, string(plainText)) } }() xor(plainText[:shorterLen], cipherText) }
Close