Rows:
CHALLENGE | AUTHORS | SOLVES (CURRENT) | SOLVE RATE (AT CONTEST TIME) |
---|---|---|---|
WelcomeMisc | 858solves | - | |
Simple LoginWeb | 366solves | Top 28%= 84/300 users | |
echoPwn | 240solves | Top 32%= 56/174 users | |
qrimeCrypto | 177solves | Top 38%= 91/239 users | |
172solves | Top 15%= 71/458 users | ||
Country DBWeb | 148solves | Top 33%= 246/729 teams | |
inboundPwn | 138solves | Top 28%= 57/197 users | |
masking tapeRev | 112solves | Top 19%= 61/316 users | |
before-writePwn | 107solves | - | |
catcpyPwn | 104solves | Top 20%= 41/197 users | |
91solves | Top 15%= 42/279 users | ||
Rainbow Sweet AlchemistCrypto | 87solves | Top 17%= 42/239 users | |
hexechoPwn | 86solves | Top 15%= 27/174 users | |
Alpaca PollWeb | 83solves | Top 9%= 42/458 users | |
CaaSWeb | 63solves | Top 4%= 13/300 users | |
A Dance of Add and MulCrypto | 59solves | Top 12%= 30/239 users | |
Pico Note 1Web | 58solves | Top 3%= 10/300 users | |
XOR-CBCCrypto | 57solves | - | |
OysterPwn | 57solves | Top 42%= 40/95 users | |
writePwn | 56solves | - |
Rows:
出力からフラグを復元してください🐍
import os
import random
from Crypto.Util.number import bytes_to_long
x = bytes_to_long(os.getenv("FLAG").encode())
for _ in range(42):
x *= random.getrandbits(42)
print(x)
出力:
302825260919317779466638288706941757478119936504864503289299111810878557424069832851837952929397907929396668240458993245662741522591539210493306557224673507192171095532552008396687356525313836501117714017702880902013061423179550493813470620956236263763510927657899587551000326509836294794948423351121777067521675908878203343378571238778872260377769563951765315203164771192344115744888944635103673374760547507150197387248980588584664707496184797486345139870127142403853041203948936595396757260050089360185668376949219377211437731767603055237909466371770346897408000000000000000