The crypto-exploit exercises virtual machine (VM) is a learning tool that teaches concepts via giving the user a chance to solve actual problems. A virtual machine has been set up with nine different cryptographic problems. The topics covered in crypto exploit exercises include simple ciphers, weak encryption schemes, weak key choices, one time pad encryption, in-sync encryption, secret sharing, public key encryption, CPA-security and CCA-security. This talk will give a short introduction to cryptographic concepts, and then introduce the Crypto-Exploit exercises VM and how to use it.