EASY SCRIPT
by YugiYami - Sunday November 3, 2024 at 09:30 PM
#1
Def get_flag():
    e = 65537
    for _ in range(5):
        io.recvuntil(b'Round ')
        print(io.recvline().split()[0].decode())
        io.recvuntil(b'?\n')
        key = RSA.importKey(io.recvuntil(b'-----END PUBLIC KEY-----\n'))
        n, e = key.n, key.e
        p, q = list(factor(n))
        io.sendlineafter(b'pumpkin = ', str(p[0]).encode())
        io.sendlineafter(b'pumpkin = ', str(q[0]).encode())
        io.recvline()
    flag = io.recvline().strip().decode()
    return flag
def pwn():
    flag = get_flag()
    print(flag)
if __name__ == '__main__':
    if args.REMOTE:
        host_port = sys.argv[1].split(':')
        HOST = host_port[0]
        PORT = host_port[1]
        io = remote(HOST, PORT, level='error')
    else:
        import os
        os.chdir('../challenge')
        io = process(['python3', 'server.py'], level='error')
    pwn()
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Bypassing Modern AV (Metasploit Method) godco99 4 289 7 hours ago
Last Post: nobinary
  Cardable Giftcard Websites AKASHIC 10 338 Today, 12:16 AM
Last Post: fokfdo223
  Acunetix 23.7 lolol 37 7,231 Apr 29, 2026, 09:37 AM
Last Post: Usercomplex
  [FREE] Database Searcher Telegram odanbtw 1,004 80,516 Apr 24, 2026, 12:13 PM
Last Post: FAKE_NBOBN00
  ✅ Top 10 Google Dorks For SQL Injections NextSoftGroup 9 231 Apr 24, 2026, 02:54 AM
Last Post: elliotalderson4

Forum Jump:


 Users browsing this forum: 1 Guest(s)