Click here to Skip to main content
12,253,335 members (50,552 online)
Click here to Skip to main content

Stats

281.3K views
3.3K downloads
80 bookmarked
Posted

Exploiting MD5 collisions (in C#)

, 20 Sep 2005
This article shows how the MD5 collisions can be used to tamper software distribution schemas.
Md5Extractor
App.ico
Md5Extractor.csproj.user
EvilExe
App.ico
EvilExe.csproj.user
GoodExe
App.ico
GoodExe.csproj.user
Md5Clone
App.ico
Md5Clone.csproj.user
Md5Clone.resharperoptions
Md5Clone.exe
Md5Extractor.exe
EvilExe.exe
GoodExe.exe

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

Share

About the Author

ediazc
Web Developer
Chile Chile
Eduardo Diaz
personal blog

You may also be interested in...

| Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.160426.1 | Last Updated 20 Sep 2005
Article Copyright 2005 by ediazc
Everything else Copyright © CodeProject, 1999-2016
Layout: fixed | fluid