nsa-codebreaker-2020
Crypton
Our great sponsors
nsa-codebreaker-2020 | Crypton | |
---|---|---|
4 | 1 | |
74 | 1,171 | |
- | - | |
0.0 | 0.0 | |
almost 3 years ago | almost 3 years ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nsa-codebreaker-2020
- luker983/nsa-codebreaker-2020 - solutions to the 2020 NSA Codebreaker Challenge
-
NSA Codebreaker - 2 Days Left
Here are my solutions. If you have any questions feel free to ask them on the Discussions page or pm me!
- NSA Codebreaker Challenge 2020 Solutions
Crypton
-
Cyber Apocalypse CTF 2022 Writeup - Down the Rabinhole
n = 56438641309774959123579452414864548345708278641778632906871133633348990457713200426806112132039095059800662176837023585166134224681069774331148738554157081531312104961252755406614635488382297434171375724135403083446853715913787796744272218693049072693460001363598351151832646947233969595478647666992523249343972394051106514947235445828889363124242280013397047951812688863313932909903047 e = 2 B = 263063435253385937926984981365320113271 c1= 429546912004731012886527767254149694574730322956287028161761007271362927652041138366004560890773167255588200792979452452 c2= 29903904396126887576044949247400308530425862142675118500848365445245957090320752747039056821346410855821626622960719507094119542088455732058232895757115241568569663893434035594991241152575495936972994239671806350060725033375704703416762794475486000391074743029264587481673930383986479738961452214727157980946 delta = (B + n) >> 1 c1 = (c1 + delta^2) % n c2 = (c2 + delta^2) % n # Source: https://github.com/ashutosh1206/Crypton/blob/master/RSA-encryption/Attack-Franklin-Reiter/exploit.sage def gcd(a, b): while b: a, b = b, a % b return a.monic() def franklinreiter(C1, C2, e, N, a, b): P. = PolynomialRing(Zmod(N)) g1 = (a*X + b)^e - C1 g2 = X^e - C2 result = -gcd(g1, g2).coefficients()[0] return result def int_to_bytes(x: int) -> bytes: return x.to_bytes((x.bit_length() + 7) // 8, 'big') bg = 0x272727272727272727272727272727272727272727272727272727272727272727272727272727 soln = franklinreiter(c2, c1, e, n, 1 << 312, bg + delta - (delta << 312)) - delta print(int_to_bytes(int(soln)))
What are some alternatives?
XFFF - CTF servers using socket() and No-sql
CTFever - Fantastic toolkit for CTFers and everyone.
ofrak - OFRAK: unpack, modify, and repack binaries.
CTFNote - CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
xepor - Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
CTFs - CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
hackthebox-writeups - Writeups for HacktheBox 'boot2root' machines
featherduster - An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
tryhackme-writeups - Write-Ups for TryHackMe
ctfcli - ctfcli is a tool to manage Capture The Flag events and challenges
Digital-Forensics-Guide - Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
basecrack - Decode All Bases - Base Scheme Decoder