AlpacaHack Logo

Challenges

Sign InSign Up

Rows:

CHALLENGEAUTHORS

SOLVES

(CURRENT)

SOLVE RATE

(AT CONTEST TIME)

Welcome
Misc

admin

953

solves

-

AlpacaHack Round 2 (Web)

411

solves

Top 28%

= 84/300 users

echo
Pwn

AlpacaHack Round 1 (Pwn)

265

solves

Top 32%

= 56/174 users

AlpacaHack Round 7 (Web)

202

solves

Top 15%

= 71/458 users

qrime
Crypto

AlpacaHack Round 3 (Crypto)

187

solves

Top 38%

= 91/239 users

CakeCTF 2023

166

solves

Top 33%

= 246/729 teams

AlpacaHack Round 6 (Pwn)

155

solves

Top 28%

= 57/197 users

AlpacaHack Round 8 (Rev)

125

solves

Top 19%

= 61/316 users

RTACTF 2023 Spring

117

solves

-

AlpacaHack Round 6 (Pwn)

110

solves

Top 20%

= 41/197 users

AlpacaHack Round 4 (Rev)

99

solves

Top 15%

= 42/279 users

AlpacaHack Round 7 (Web)

98

solves

Top 9%

= 42/458 users

AlpacaHack Round 11 (Web)

96

solves

Top 29%

= 63/213 users

AlpacaHack Round 3 (Crypto)

92

solves

Top 17%

= 42/239 users

AlpacaHack Round 1 (Pwn)

92

solves

Top 15%

= 27/174 users

AlpacaHack Round 10 (Pwn)

78

solves

Top 42%

= 40/95 users

CaaS
Web

AlpacaHack Round 2 (Web)

68

solves

Top 4%

= 13/300 users

RTACTF 2023 Spring

64

solves

-

AlpacaHack Round 2 (Web)

60

solves

Top 3%

= 10/300 users

AlpacaHack Round 3 (Crypto)

60

solves

Top 12%

= 30/239 users

Rows:

trippple

SECCON CTF 13 決勝観戦CTF
100 solves
Crypto

Author:

出力からフラグを復元してください🐍

import os
from Crypto.Util.number import getPrime, bytes_to_long

m = bytes_to_long(os.getenv("FLAG").encode())
p = getPrime(96)
n = p * p * p
e = 65537
c = pow(m, e, n)

print(f"{n,c=}")

出力:

n,c=(272361880253535445317143279209232620259509770172080133049487958853930525983846305005657, 69147423377323669983172806367084358432369489877851180970277804462365354019444586165184)
descriptionsolveswriteups