cryptoeasy

Ни в чём не ошибся

duckerz

Task: RSA encryption with encoder.py and out.txt files. Solution: Discovered that e_output = e + p leaks the prime factor; recovered p by subtracting standard e=65537, then trivially factored n and decrypted the flag.

$ ls tags/ techniques/
prime_factor_leaktrivial_factorization

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]