Rows:
CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
---|---|---|---|
WelcomeMisc | 953solves | - | |
Simple LoginWeb | 411solves | Top 28%= 84/300 users | |
echoPwn | 265solves | Top 32%= 56/174 users | |
202solves | Top 15%= 71/458 users | ||
qrimeCrypto | 187solves | Top 38%= 91/239 users | |
Country DBWeb | 166solves | Top 33%= 246/729 teams | |
inboundPwn | 155solves | Top 28%= 57/197 users | |
masking tapeRev | 125solves | Top 19%= 61/316 users | |
before-writePwn | 117solves | - | |
catcpyPwn | 110solves | Top 20%= 41/197 users | |
99solves | Top 15%= 42/279 users | ||
Alpaca PollWeb | 98solves | Top 9%= 42/458 users | |
JackpotWeb | 96solves | Top 29%= 63/213 users | |
Rainbow Sweet AlchemistCrypto | 92solves | Top 17%= 42/239 users | |
hexechoPwn | 92solves | Top 15%= 27/174 users | |
OysterPwn | 78solves | Top 42%= 40/95 users | |
CaaSWeb | 68solves | Top 4%= 13/300 users | |
writePwn | 64solves | - | |
Pico Note 1Web | 60solves | Top 3%= 10/300 users | |
A Dance of Add and MulCrypto | 60solves | Top 12%= 30/239 users |
Rows:
出力からフラグを復元してください🐍
import os
from Crypto.Util.number import getPrime, bytes_to_long
x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
x *= getPrime(42)
print(x)
出力:
1147519914005635970823022779519580521609222940350823007699842537827644738629829657046897975782350987748029018405699017377382521676899556171556649128260865812262043303782475632488849236816194782530154901066736272457909268699844626557409460652217501658644287801649083260640392194864370700199619482572398308537257922259125395585581757757644945754520977388691814074631081409677094992839775104691433743609551833747629636402523522392312458111656977789142053773849669780021688811768524291886161405435708715493344047580746854894532523408006689911316576153711061177239836663374119954672786387