cryptoProeasy
Ни в чём не ошибся
duckerz
Task: RSA encryption with encoder.py and out.txt files. Solution: Discovered that e_output = e + p leaks the prime factor; recovered p by subtracting standard e=65537, then trivially factored n and decrypted the flag.
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [crypto][Pro]Ничего особенного (Nothing Special)— hackerlab
- [crypto][Pro]Только RSA (JustRSA)— duckerz
- [crypto][Pro]Огромные цифры (Huge Numbers)— hackerlab
- [crypto][Pro]ChristmasRSA— grodno_new_year_2026
- [crypto][Pro]RSA?— grodno_new_year_2026