Challenge 34 ☆☆
Welcome to challenge Challenge 34.
Find the secret hidden in the WrongSecrets repository. This challenge focuses on Cryptography.
💡 Look for: Configuration files, source code, environment variables, Docker files, or cloud infrastructure related to this challenge.
Many security folks teach engineers to use secure key derivation functions like PBKDF2 when a key needs to be generated. A developer followed this instruction and tried to create a key in Challenge34.java
, which should now be far more secure than a hardcoded key.
Can you spot the mistake? Can you find the value of the generated key?