Conducted a detailed investigation of vulnerable applications of cryptography and identified an attack vector based on the length-extension vulnerability of hash functions in the MD5 and SHA families
Utilized Docker to set up a virtual environment for testing and conducting the attack