{"guid":"c7b3314c-165c-446d-963c-609922ea990f","title":"Defeating (Not)Petya's Cryptography","subtitle":null,"slug":"34c3-8724-defeating_not_petya_s_cryptography","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8724.html","description":"In this presentation we will outline our findings about (Not)Petya's crypto flaws and how we were able to exploit them to decrypt infected computers.\n","original_language":"eng","persons":["Sebastian Eschweiler"],"tags":["34c3","8724","Security"],"view_count":1172,"promoted":false,"date":"2017-12-27T00:00:00.000+01:00","release_date":"2017-12-28T01:00:00.000+01:00","updated_at":"2026-03-26T03:15:04.471+01:00","length":3283,"duration":3283,"thumb_url":"https://static.media.ccc.de/media/congress/2017/8724-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/8724-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/c7b3314c-165c-446d-963c-609922ea990f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/c7b3314c-165c-446d-963c-609922ea990f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-8724-defeating_not_petya_s_cryptography","url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":48},{"event_id":4766,"event_guid":"19b7e5d7-bba7-46da-afbc-f16d43fe395f","weight":54},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":49},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":50},{"event_id":4785,"event_guid":"4c4af291-e9ed-4dc9-8b2e-9062db9924fa","weight":28},{"event_id":4790,"event_guid":"edd02e52-28f8-4f3e-8b17-75cffecb6d7f","weight":57},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":47},{"event_id":4793,"event_guid":"22027440-b3fb-49d5-a35b-b86e7d77cfb9","weight":49},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":90},{"event_id":4795,"event_guid":"722ce759-9cde-4e3b-8db5-5a97aa9673d9","weight":49},{"event_id":4796,"event_guid":"ff24373e-ebe2-4077-9db0-eae5ab003538","weight":54},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":27},{"event_id":4803,"event_guid":"23d59026-ab98-4f6c-a46d-0bb3e1788a67","weight":46},{"event_id":4810,"event_guid":"c1acc5c2-58b2-4ed5-a504-351b8b93c171","weight":48},{"event_id":4813,"event_guid":"d5d27820-0e97-4c19-bf57-b470cbbd97ef","weight":44},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":78},{"event_id":4830,"event_guid":"5cf8c222-47d3-4741-9324-be182b4d0fb8","weight":45},{"event_id":4833,"event_guid":"e1a60f7b-6a56-4dce-ab3a-c686fa940aa8","weight":36},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":48}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:46:46.414+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography.en.srt","url":"https://api.media.ccc.de/public/recordings/44437","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":269,"length":3283,"mime_type":"video/mp4","language":"eng","filename":"34c3-8724-eng-Defeating_Not_Petyas_Cryptography.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T14:10:23.650+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8724-eng-Defeating_Not_Petyas_Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/20887","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":271,"length":3283,"mime_type":"video/mp4","language":"fra","filename":"34c3-8724-fra-Defeating_Not_Petyas_Cryptography.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T14:10:33.600+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8724-fra-Defeating_Not_Petyas_Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/20888","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":271,"length":3283,"mime_type":"video/mp4","language":"deu","filename":"34c3-8724-deu-Defeating_Not_Petyas_Cryptography.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T14:10:44.343+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8724-deu-Defeating_Not_Petyas_Cryptography.mp4","url":"https://api.media.ccc.de/public/recordings/20889","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":461,"length":3283,"mime_type":"video/mp4","language":"eng-fra-deu","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T14:11:01.171+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_hd.mp4","url":"https://api.media.ccc.de/public/recordings/20890","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":245,"length":3283,"mime_type":"video/mp4","language":"eng-fra-deu","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-28T21:29:44.561+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-hd/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/21229","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":34,"length":3268,"mime_type":"audio/opus","language":"eng","filename":"34c3-8724-eng-Defeating_Not_Petyas_Cryptography.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-28T21:32:06.825+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/opus/34c3-8724-eng-Defeating_Not_Petyas_Cryptography.opus","url":"https://api.media.ccc.de/public/recordings/21233","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":49,"length":3268,"mime_type":"audio/mpeg","language":"eng","filename":"34c3-8724-eng-Defeating_Not_Petyas_Cryptography.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-28T21:32:38.170+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/mp3/34c3-8724-eng-Defeating_Not_Petyas_Cryptography.mp3","url":"https://api.media.ccc.de/public/recordings/21234","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":225,"length":3283,"mime_type":"video/mp4","language":"eng-fra-deu","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-28T21:33:14.791+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-sd/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_sd.mp4","url":"https://api.media.ccc.de/public/recordings/21235","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":400,"length":3283,"mime_type":"video/webm","language":"eng-fra-deu","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-28T22:14:43.709+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-sd/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/21268","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":604,"length":3283,"mime_type":"video/webm","language":"eng-fra-deu","filename":"34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T00:12:27.438+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-hd/34c3-8724-eng-fra-deu-Defeating_Not_Petyas_Cryptography_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/21353","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":66,"length":3283,"mime_type":"video/mp4","language":"eng","filename":"34c3-8724-eng-Defeating_Not_Petyas_Cryptography_sd-slides.mp4","state":"new","folder":"slides-h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-01-02T15:28:51.025+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-sd/34c3-8724-eng-Defeating_Not_Petyas_Cryptography_sd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/22274","event_url":"https://api.media.ccc.de/public/events/c7b3314c-165c-446d-963c-609922ea990f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"}]}