From 561e9e52b03b06ac310cc186cc31c61a564798b0 Mon Sep 17 00:00:00 2001 From: David Kaufmann Date: Sun, 17 Jan 2016 10:28:31 +0100 Subject: [PATCH] typo --- report/content/exercise2.tex | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/report/content/exercise2.tex b/report/content/exercise2.tex index 0b81c61..89bd0dd 100644 --- a/report/content/exercise2.tex +++ b/report/content/exercise2.tex @@ -142,8 +142,8 @@ We examined the dumps and suspected the covert channel to be in the IPID fields. After exporting the bytes into separate files we were stuck at decrypting the decoded bytes. \begin{verbatim} -$ ./decode\_ipid.py -$ openssl enc -d -rc4 -nosalt -k nSa123 -in stream\_encrypted -out stream\_decrypted +$ ./decode_ipid.py +$ openssl enc -d -rc4 -nosalt -k nSa123 -in stream_encrypted -out stream_decrypted \end{verbatim} After the hint \quote{Use the toooools!} we adapted the autocorr.py tool to not require the output parameter and wrote a shell wrapper to loop through all csv files for a given field name. -- 2.43.0