HSCTF - RSA Cryptography (Reverse Search Algorithm)

Поділитися
Вставка
  • Опубліковано 16 жов 2024
  • If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
    E-mail: johnhammond010@gmail.com
    PayPal: paypal.me/johnh...
    GitHub: github.com/Joh...
    Site: www.johnhammond...
    Twitter: / _johnhammond

КОМЕНТАРІ • 20

  • @prafulgupta7004
    @prafulgupta7004 5 років тому +10

    I dont know how easy you make everything.

  • @TheSclare
    @TheSclare 5 років тому +7

    Can you do some videos about reverse engineering?

  • @glasgOWned
    @glasgOWned 5 років тому

    For katana, one suggestion would be to also display which method gave the "potential flag". So something like "potential flag via RSA:"

  • @noinformationavailable4114
    @noinformationavailable4114 5 років тому

    Right on! This is sweet!

  • @talhayunus6516
    @talhayunus6516 3 роки тому

    what if N is some number which factors to only one number not 2
    N=27
    N = 3^3
    in this case what will be p and q?

    • @FostersLab
      @FostersLab 3 роки тому

      In this case, it would not be RSA encoding, since N is defined as the product of two distinct prime numbers (p and q). So, outside of the scope of this video, I suppose :)

  • @stoicsaiyajin
    @stoicsaiyajin 5 років тому

    hello @John Hammond when i compile the script i get the error
    File "/home/toogi/.local/lib/python3.6/site-packages/primefac.py", line 601
    print "\033[1;31m" + (names[g] if g in names else g) + "\033[;m",
    i have tried to change 1;31m to 1;31 or something error occurs in m can you help me please?

    • @_JohnHammond
      @_JohnHammond  5 років тому

      It looms like you are using Python3 for that primefac library, and it is trying to run an old print statement without parentheses. You might need to patch that file so with reads print() with all that content inside of the parentheses

  • @belajar_apa_saja
    @belajar_apa_saja 3 роки тому

    How to find rsa with 2048 prime bit?

  • @ashishsingh-ty6kf
    @ashishsingh-ty6kf 5 років тому

    awesome thanks for primefac sir

  • @giomke
    @giomke 5 років тому +1

    you are unstoppable :D (y)

  • @amangoel1675
    @amangoel1675 5 років тому +1

    Katana is great 👍

  • @infosecspirit
    @infosecspirit 5 років тому

    When are u going to release katana ? looks like its awesome..

    • @_JohnHammond
      @_JohnHammond  5 років тому +1

      We are going to need a couple more months, admittedly. Both of us (developers) are away for work -- hence the hotel room behind me in the webcam shot. ;)

  • @UsamaAli-kr2cw
    @UsamaAli-kr2cw 5 років тому

    Which terminal are you using?

    • @_JohnHammond
      @_JohnHammond  5 років тому

      I run Terminator for the GUI and use OhMyZsh with the autosuggestions plugin.

  • @aditisingh1728
    @aditisingh1728 5 років тому

    👍👍

  • @rishi905
    @rishi905 5 років тому +1

    Really awesome 10 line code crack RSA .

  • @axelvazquez2452
    @axelvazquez2452 5 років тому

    Try the bomb, just solved today using cyberchef (bombe refers to enigma machine dechiper)

  • @bobjime510
    @bobjime510 5 років тому

    plezz cource C-Language
    thank you bro