Click here to Skip to main content
11,429,399 members (68,249 online)
Click here to Skip to main content
Add your own
alternative version

Exploiting MD5 collisions (in C#)

, 20 Sep 2005
This article shows how the MD5 collisions can be used to tamper software distribution schemas.
hackingmd5_src.zip
Md5Extractor
App.ico
Md5Extractor.csproj.user
EvilExe
App.ico
EvilExe.csproj.user
GoodExe
App.ico
GoodExe.csproj.user
Md5Clone
App.ico
Md5Clone.csproj.user
Md5Clone.resharperoptions
md5clone.zip
Md5Clone.exe
Md5Extractor.exe
EvilExe.exe
GoodExe.exe

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

Share

About the Author

ediazc
Web Developer
Chile Chile
Eduardo Diaz
personal blog

| Advertise | Privacy | Terms of Use | Mobile
Web03 | 2.8.150428.2 | Last Updated 20 Sep 2005
Article Copyright 2005 by ediazc
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid