AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

1229

solves

-

Daily AlpacaHack

633

solves

-

AlpacaHack Round 2 (Web)

509

solves

Top 28%

= 84/300 users

Daily AlpacaHack

427

solves

-

echo
Pwn

AlpacaHack Round 1 (Pwn)

309

solves

Top 32%

= 56/174 users

Daily AlpacaHack

306

solves

-

Daily AlpacaHack

283

solves

-

Daily AlpacaHack

255

solves

-

AlpacaHack Round 7 (Web)

244

solves

Top 15%

= 71/458 users

qrime
Crypto

AlpacaHack Round 3 (Crypto)

226

solves

Top 38%

= 91/239 users

CakeCTF 2023

205

solves

Top 33%

= 246/729 teams

Daily AlpacaHack

199

solves

-

AlpacaHack Round 6 (Pwn)

187

solves

Top 28%

= 57/197 users

Daily AlpacaHack

183

solves

-

Daily AlpacaHack

181

solves

-

Daily AlpacaHack

179

solves

-

Daily AlpacaHack

169

solves

-

AlpacaHack Round 8 (Rev)

159

solves

Top 19%

= 61/316 users

Daily AlpacaHack

152

solves

-

RTACTF 2023 Spring

146

solves

-

Rows:

42

SECCON CTF 13 決勝観戦CTF
57 solves
Crypto

Author:

出力からフラグを復元してください🐍

import os
from Crypto.Util.number import getPrime, bytes_to_long

x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
    x *= getPrime(42)
print(x)

出力:

1147519914005635970823022779519580521609222940350823007699842537827644738629829657046897975782350987748029018405699017377382521676899556171556649128260865812262043303782475632488849236816194782530154901066736272457909268699844626557409460652217501658644287801649083260640392194864370700199619482572398308537257922259125395585581757757644945754520977388691814074631081409677094992839775104691433743609551833747629636402523522392312458111656977789142053773849669780021688811768524291886161405435708715493344047580746854894532523408006689911316576153711061177239836663374119954672786387
descriptionsolveswriteups