Rows:
| CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
|---|---|---|---|
WelcomeMisc | 1229 solves | - | |
AlpacaHack 2100Misc | 633 solves | - | |
Simple LoginWeb | 509 solves | Top 28% = 84/300 users | |
a fact of CTFCrypto | 427 solves | - | |
echoPwn | 309 solves | Top 32% = 56/174 users | |
EmojifyWeb | 306 solves | - | |
283 solves | - | ||
255 solves | - | ||
244 solves | Top 15% = 71/458 users | ||
qrimeCrypto | 226 solves | Top 38% = 91/239 users | |
Country DBWeb | 205 solves | Top 33% = 246/729 teams | |
hit-and-missMisc | 199 solves | - | |
inboundPwn | 187 solves | Top 28% = 57/197 users | |
183 solves | - | ||
size limitCrypto | 181 solves | - | |
179 solves | - | ||
Alpaca BankWeb | 169 solves | - | |
masking tapeRev | 159 solves | Top 19% = 61/316 users | |
Fully Padded RSACrypto | 152 solves | - | |
before-writePwn | 146 solves | - |
Rows:
出力からフラグを復元してください🐍
import os
from Crypto.Util.number import getPrime, bytes_to_long
x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
x *= getPrime(42)
print(x)
出力:
1147519914005635970823022779519580521609222940350823007699842537827644738629829657046897975782350987748029018405699017377382521676899556171556649128260865812262043303782475632488849236816194782530154901066736272457909268699844626557409460652217501658644287801649083260640392194864370700199619482572398308537257922259125395585581757757644945754520977388691814074631081409677094992839775104691433743609551833747629636402523522392312458111656977789142053773849669780021688811768524291886161405435708715493344047580746854894532523408006689911316576153711061177239836663374119954672786387