• 2024-02-10BeginCTF 2024(自由赛道)MISC
    realcheckin题目:从catf1y的笔记本中发现了这个神秘的代码MJSWO2LOPNLUKTCDJ5GWKX3UN5PUEM2HNFXEGVCGL4ZDAMRUL5EDAUDFL5MU6VK7O5UUYMK7GEYWWZK7NE3X2===你能帮助我找到最后的flag吗?我的解答:base32解码begin{WELCOMe_to_B3GinCTF_2024_H0Pe_YOU_wiL1_11ke_i7}下一站上岸
  • 2024-02-08BeginCTF 2024(自由赛道)CRYPTO
    PAD某同学在学习RSA得时候,觉得仅仅靠着比特位得RSA是不安全的,于是参考了部分资料后,灵光乍现Author:lingfengDifficult:easytask.pyimportrandom,mathfromCrypto.Util.numberimport*fromflagimportflagflag=flag[:64]assertlen(flag)==64classRSA():
  • 2024-02-06BeginCTF 2024(自由赛道)
    哈哈哈最后的排名Miscrealcheckin得到题目给了一段密文MJSWO2LOPNLUKTCDJ5GWKX3UN5PUEM2HNFXEGVCGL4ZDAMRUL5EDAUDFL5MU6VK7O5UUYMK7GEYWWZK7NE3X2===base32解码得到flag所以flag为:begin{WELCOMe_to_B3GinCTF_2024_H0Pe_YOU_wiL1_11ke_i7}whereiscrazymanv1.0拿
  • 2024-02-06Beginctf赛后总结
    cryptofake_nfromCrypto.Util.numberimport*fromsecretimportflag​deffakeN_list():  puzzle_list=[]​  foriinrange(15):    r=getPrime(32)    puzzle_list.append(r)​  p=getPrime(32)  q=getPrime(32)  com=p*q
  • 2024-02-06beginctf 赛后总结
    cryptofake_nfromCrypto.Util.numberimport*fromsecretimportflagdeffakeN_list():puzzle_list=[]foriinrange(15):r=getPrime(32)puzzle_list.append(r)p=getPrime(32)q=getPrime(32)com=p*qpu