Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
AlpacaHack 2100Misc | 1645 solves | - | |
WelcomeMisc | 1546 solves | - | |
a fact of CTFCrypto | 883 solves | - | |
Simple LoginWeb | 612 solves | Top 28% = 84/300 users | |
EmojifyWeb | 597 solves | - | |
569 solves | - | ||
510 solves | Top 73% = 683/928 teams | ||
super-tomatoCrypto | 392 solves | - | |
hit-and-missMisc | 388 solves | - | |
echoPwn | 357 solves | Top 32% = 56/174 users | |
Xmas LoginWeb | 355 solves | - | |
346 solves | - | ||
Alpaca BankWeb | 332 solves | - | |
328 solves | - | ||
size limitCrypto | 320 solves | - | |
Encoding BasicsMisc Crypto | 318 solves | - | |
314 solves | - | ||
🐈Web | 312 solves | - | |
BarsWeb | 301 solves | - | |
108Misc | 296 solves | - |
Rows:
出力からフラグを復元してください🐍
import os
from Crypto.Util.number import getPrime, bytes_to_long
x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
x *= getPrime(42)
print(x)
出力:
1147519914005635970823022779519580521609222940350823007699842537827644738629829657046897975782350987748029018405699017377382521676899556171556649128260865812262043303782475632488849236816194782530154901066736272457909268699844626557409460652217501658644287801649083260640392194864370700199619482572398308537257922259125395585581757757644945754520977388691814074631081409677094992839775104691433743609551833747629636402523522392312458111656977789142053773849669780021688811768524291886161405435708715493344047580746854894532523408006689911316576153711061177239836663374119954672786387