- 2024-02-10BeginCTF 2024(自由赛道)MISC
realcheckin题目:从catf1y的笔记本中发现了这个神秘的代码MJSWO2LOPNLUKTCDJ5GWKX3UN5PUEM2HNFXEGVCGL4ZDAMRUL5EDAUDFL5MU6VK7O5UUYMK7GEYWWZK7NE3X2===你能帮助我找到最后的flag吗?我的解答:base32解码begin{WELCOMe_to_B3GinCTF_2024_H0Pe_YOU_wiL1_11ke_i7}下一站上岸
- 2024-02-08BeginCTF 2024(自由赛道)CRYPTO
PAD某同学在学习RSA得时候,觉得仅仅靠着比特位得RSA是不安全的,于是参考了部分资料后,灵光乍现Author:lingfengDifficult:easytask.pyimportrandom,mathfromCrypto.Util.numberimport*fromflagimportflagflag=flag[:64]assertlen(flag)==64classRSA():
- 2024-02-06BeginCTF 2024(自由赛道)
哈哈哈最后的排名Miscrealcheckin得到题目给了一段密文MJSWO2LOPNLUKTCDJ5GWKX3UN5PUEM2HNFXEGVCGL4ZDAMRUL5EDAUDFL5MU6VK7O5UUYMK7GEYWWZK7NE3X2===base32解码得到flag所以flag为:begin{WELCOMe_to_B3GinCTF_2024_H0Pe_YOU_wiL1_11ke_i7}whereiscrazymanv1.0拿
- 2024-02-06Beginctf赛后总结
cryptofake_nfromCrypto.Util.numberimport*fromsecretimportflagdeffakeN_list(): puzzle_list=[] foriinrange(15): r=getPrime(32) puzzle_list.append(r) p=getPrime(32) q=getPrime(32) com=p*q
- 2024-02-06beginctf 赛后总结
cryptofake_nfromCrypto.Util.numberimport*fromsecretimportflagdeffakeN_list():puzzle_list=[]foriinrange(15):r=getPrime(32)puzzle_list.append(r)p=getPrime(32)q=getPrime(32)com=p*qpu