Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
WelcomeMisc | 1313 solves | - | |
AlpacaHack 2100Misc | 846 solves | - | |
a fact of CTFCrypto | 562 solves | - | |
Simple LoginWeb | 527 solves | Top 28% = 84/300 users | |
EmojifyWeb | 401 solves | - | |
373 solves | - | ||
337 solves | - | ||
echoPwn | 317 solves | Top 32% = 56/174 users | |
hit-and-missMisc | 264 solves | - | |
252 solves | Top 15% = 71/458 users | ||
qrimeCrypto | 239 solves | Top 38% = 91/239 users | |
233 solves | - | ||
size limitCrypto | 233 solves | - | |
Alpaca BankWeb | 233 solves | - | |
232 solves | - | ||
πWeb | 223 solves | - | |
Country DBWeb | 210 solves | Top 33% = 246/729 teams | |
Safe PrimeCrypto | 207 solves | - | |
Xmas LoginWeb | 201 solves | - | |
inboundPwn | 195 solves | Top 28% = 57/197 users |
Rows:
εΊεγγγγ©γ°γεΎ©ε γγ¦γγ γγπ
import os
from Crypto.Util.number import getPrime, bytes_to_long
x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
x *= getPrime(42)
print(x)
εΊε:
1147519914005635970823022779519580521609222940350823007699842537827644738629829657046897975782350987748029018405699017377382521676899556171556649128260865812262043303782475632488849236816194782530154901066736272457909268699844626557409460652217501658644287801649083260640392194864370700199619482572398308537257922259125395585581757757644945754520977388691814074631081409677094992839775104691433743609551833747629636402523522392312458111656977789142053773849669780021688811768524291886161405435708715493344047580746854894532523408006689911316576153711061177239836663374119954672786387