HSCTF - RSA Cryptography (Reverse Search Algorithm)
Вставка
- Опубліковано 16 жов 2024
- If you would like to support me, please like, comment & subscribe, and check me out on Patreon: / johnhammond010
E-mail: johnhammond010@gmail.com
PayPal: paypal.me/johnh...
GitHub: github.com/Joh...
Site: www.johnhammond...
Twitter: / _johnhammond
I dont know how easy you make everything.
Can you do some videos about reverse engineering?
For katana, one suggestion would be to also display which method gave the "potential flag". So something like "potential flag via RSA:"
Right on! This is sweet!
what if N is some number which factors to only one number not 2
N=27
N = 3^3
in this case what will be p and q?
In this case, it would not be RSA encoding, since N is defined as the product of two distinct prime numbers (p and q). So, outside of the scope of this video, I suppose :)
hello @John Hammond when i compile the script i get the error
File "/home/toogi/.local/lib/python3.6/site-packages/primefac.py", line 601
print "\033[1;31m" + (names[g] if g in names else g) + "\033[;m",
i have tried to change 1;31m to 1;31 or something error occurs in m can you help me please?
It looms like you are using Python3 for that primefac library, and it is trying to run an old print statement without parentheses. You might need to patch that file so with reads print() with all that content inside of the parentheses
How to find rsa with 2048 prime bit?
awesome thanks for primefac sir
you are unstoppable :D (y)
Katana is great 👍
When are u going to release katana ? looks like its awesome..
We are going to need a couple more months, admittedly. Both of us (developers) are away for work -- hence the hotel room behind me in the webcam shot. ;)
Which terminal are you using?
I run Terminator for the GUI and use OhMyZsh with the autosuggestions plugin.
👍👍
Really awesome 10 line code crack RSA .
Try the bomb, just solved today using cyberchef (bombe refers to enigma machine dechiper)
plezz cource C-Language
thank you bro