Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
The Crypto Coprocessor (CCP) is a separate processor that takes in request to perform cryptographic operations. However, to make such a request, it must be cryptographically signed via HMAC. These are the keys to the kingdom.
In the request, you can specify the size of the key being used. Because of this, each byte of the key can be brute forced with a 1/256 chance of being correct. By doing this byte by byte, we can recover the entire key being used.
Cryptography is hard! Not just the math but the logic must be perfect as well. Such a meme of a bug!