Skip to main content
Ruben Gonzalez - Hacking Cryptography: Attacks, Tools and Techniques - DCTLV2025
Ruben Gonzalez - Hacking Cryptography: Attacks, Tools and Techniques - DCTLV2025

Ruben Gonzalez - Hacking Cryptography: Attacks, Tools and Techniques - DCTLV2025

Name of Training: Hacking Cryptography: Attacks, Tools, and Techniques
Trainer(s): Ruben Gonzalez and Benjamin Walny
Dates: August 11-12, 2025
Time: 8:00 am to 5:00 pm PT
Venue: Las Vegas Convention Center
Cost: $2,000

Course Description: 

Crypto related bugs are super common. OWASP even ranks "Cryptographic Failure" as the second most common security vulnerability class in software. Yet, very often these vulnerabilities are overlooked by developers, code auditors, blue teamers and penetration testers alike. Because, let's face it: Nobody knows how cryptography works.

During the course you will:

  • understand how modern cryptography works.

  • find common crypto vulnerabilities in real software.

  • write crypto exploits for real software (and an IoT device).

Using case studies from our own pentesting and red teaming engagements, we'll introduce core concepts of applied cryptography and how they fail in practice.

This course turns you into a powerful weapon. You will know how applied cryptography works, how it's commonly misused in the field and how this leads to exploitable bugs. That means, by the end of the course you will be among the very selected group of people that can identify, avoid and exploit vulnerabilities in code using crypto.

No prior knowledge required!

Learning Objectives

  • Learn how modern cryptography operates. Learn what kind of guarantees are given by certain primitives, and which aren't.

  • Understand how crypto primitives are combined into protocols.

  • Learn how cryptography is often misused in practice and how this misuse can be exploited.

  • Write exploits for systems using cryptography in an inappropriate way.

  • Evaluate program code that uses cryptography for proper usage.

  • Identify cryptographic schemes and potential vulnerabilities in black-box tests.


Course Outline


  • Introduction to Cryptography 

    • Basic Terminology 

    • Security Guarantees 

    • Composition of Primitives 

  • Attack Categorization 

    • Security Objectives and their Relation to Cryptography 

    • Attack Categorization 

  • Working with Crypto Tools 

    • Introduction to Cyber Chef 

    • Crypto tools: CryCry Toolkit and OpenSSL 

    • Challenge Lab: CryCry, OpenSSL and Cyber Chef 

  • Hacking Encryption 

    • Stream Ciphers 

      • Introduction to Stream Ciphers 

      • Real World Examples of Vulnerabilities 

      • Attacks on Stream Cipher Uses 

      • Challenge Lab: (Ab)using Stream Ciphers 

    • Block Ciphers 

      • Introduction to Block Ciphers 

      • Modes of Operation 

      • Real World Examples of Vulnerabilities 

      • Attacks on Block Cipher Uses 

      • Challenge Lab: (Ab)using Block Ciphers 

  • Hash Functions 

    • Introduction to Hash Functions 

    • Real World Examples of Vulnerabilities 

    • Password Storage & Cracking 

    • Challenge Lab: (Ab)using Hash Functions and PW Cracking 

  • Message Authentication Codes and Authenticated Encryption 

    • Introduction to Message Authentication Codes 

    • Pitfalls on Trivial Constructions 

    • Real World Examples of Vulnerabilities 

    • Challenge Lab: (Ab)using MACs and AuthEnc 

  • Attacks on Entropy and Randomness 

    • Generating Secure Keys with OS Entropy Pools 

    • Misuse of Pseudo Random Number Generators 

    • Backdoors and Cleptography 

    • Real World Examples of Vulnerabilities 

    • Challenge Lab: Keys and Randomness 

  • Asymmetric Crypto with RSA 

    • Introduction to RSA 

    • Key Formats 

    • Key Sizes and Brute Force 

    • Real World Examples of Vulnerabilities 

    • Challenge Lab: RSA and ECC 

  • Introduction to ECC 

    • Selecting Curves 

    • Nonces and Bias 

    • Exploiting Common Bugs 

    • Challenge Lab: ECC 

  • Public Key Infrastructure and Certificates 

    • Introduction to Certificates 

    • x509 Certificate Structure and Features 

    • Common Certificate Pitfalls 

    • Chain of Trust and PKI services 

    • TOFU Principle and Man-In-The-Middle Threats 

    • Challenge Lab: Certificates and PubKeys 

  • TLS and Friends 

    • Introduction to TLS and Similar Protocols 

    • TLS Security parameters 

    • Exploiting a Man-In-The-Middle position for TLS and VPN

    • Intercepting and Decrypting TLS Traffic for Application Testing 

    • Defeat Public Key Pinning with Dynamic Instrumentation 

    • Challenge Lab: Intercepting TLS 

  • JWTs and JOSE 

    • Introduction to JSON Web Tokens and Javascript Object Signing and Encryption 

    • Real World Examples of Vulnerabilities 

    • Challenge Lab: Exploiting JWT 

  • Passkeys, WebAuthn, FIDO and 2nd Factor Solutions 

    • Introduction to Password-Less Authentication 

    • TOTP Algorithms and Seeds 

    • Passkeys, FIDO2 and WebAuthn 

    • Footguns and Examples of Vulnerabilities 

  • Post-Quantum Cryptography 

    • Introduction to Post-Quantum Algorithms 

    • Post-Quantum Signatures and KEMs 

    • Upcoming Post-Quantum Standards 

    • Challenge Lab: Using OpenSSL with Post-Quantum 

  • Farewell 

    • Outlook on Future Developments 

    • Presentation of Take Home Challenges 

    • Recap 

Difficulty Level:

Beginner to Intermediate

Suggested Prerequisites:

This is a beginner to intermediate course. Students should be familiar with at least one scripting language and have a basic understanding of computer networks.

The contents are compressed, but no prior knowledge of cryptography is needed. Every subject is introduced before attacks are presented.

What Students Should Bring: 

Participants should bring a laptop with a modern browser to join the virtual learning environment.

Trainer(s) Bio:

Ruben Gonzalez (Lead Trainer)

  • 10 years in offensive security research

  • Security Researcher and Trainer at Neodyme

  • Auditor of crypto code for multiple large industry projects

  • Part-time PhD candidate for applied cryptography at the Max Planck Institute

  • Multi-time DEFCON CTF, Hack-A-Sat, HITB ProCTF and Google CTF finalist

  • Founder and Chair of the RedRocket Hacking Club

  • Linkedin: https://www.linkedin.com/in/rugond/ 

Benjamin Walny (Support Trainer)

  • 5 years in offensive security research

  • Senior Penetration Tester at Cure53

  • Code auditor for countless (web) applications

  • Profound interest in real-world attacks on cryptography

  • Multi-time DEFCON CTF finalist

Registration Terms and Conditions: 

Trainings are refundable before July 8, 2025, minus a non-refundable processing fee of $250.

Trainings are non-refundable after July 8, 2025.

Training tickets may be transferred. Please email us at training@defcon.org for specifics.

If a training does not reach the minimum registration requirement, it may be cancelled. In the event the training you choose is cancelled, you will be provided the option of receiving a full refund or transferring to another training (subject to availability).

Failure to attend the training without prior written notification, will be considered a no-show. No refund will be given.

By purchasing this ticket you agree to abide by the DEF CON Training Code of Conduct and the registration terms and conditions listed above.

Several breaks will be included throughout the day. Please note that food is not included.

$1,800.00
$2,000.00