Solving CBC-MAC II
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
content
average
completion
time
completed
this exercise