Case study – weak encryption search

Let's still use the same project, the Python Vulnerable API, to search for weak encryption used in the source code. In this case, we will be looking for the uses of the vulnerable MD5 algorithm in the source code. The tool we introduce here is The Silver Searcher, which can do a fast recursive search based on a given keyword for all file contents, and indicate the results. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.255.134