cryptoProeasy

Ничего особенного (Nothing Special)

hackerlab

Task: RSA decryption with standard parameters (2048-bit modulus, e=65537). Solution: Checked FactorDB and found the modulus was already factored, allowing direct RSA decryption.

$ ls tags/ techniques/
FactorDB modulus lookupRSA decryption with known factorsModular inverse calculation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups