Salin link nc yang diberikan picoctf
nc mercury.picoctf.net 41508

Buka terminal kalilinux lalu paste link yang telah disalin dan enter
Maka didapatkan detail RSA
Ambil detail nya dan salin ke notepad agar lebih mudah digunakan
Buka terminal kalilinux kembali, lalu buat file python dengan nama dashcund.py
touch dashcund.py

Isi file dengan program berikut
import owiener
c=24141492881014668575011990967984322926602233339350158664325968503135212968483203583758019739631033560791013630791775548775772531198269767637795779243980966023287318895278921121084099477114413314400903681485887355591052693305692156113371033566121274489661286148973691131854312778597874546531597309027499759511
e=32658820351176694525974038833951761625961866592643530159742345490036156817943095535116550589897191603582559310012172703008282476227122711928061035861554544855279517630662756837624990817155267461555088978408613781269747896682639900612152313188726421581658646196339023246827151598427581455515449056202055486963
n=101187502422546216908091483753539690460236138288133221155202854718884461375029346421229274484136680644124271881206302248985667116983472240000718044090119919826410037948326795727768753657676963863276282646385527542011027685264224202685403596727667982620828958042937237260823893413632305330505712698755036340689
d = owiener.attack(e, n)
if d is None:
print(“Failed”)
else :
M = pow(c, d, n)
print(“Decrypted message: “, M)
nilai c, e dan n dimasukan nilai berdasarkan detail RSA yang didapat

Install owiener dengan perintah
python3 -m venv venv

source venv/bin/activate

pip install owiener

Jalankan file python
python dashcund.py

Salin decrypt message yang didapatkan
Akses situs https://www.binaryhexconverter.com/decimal-to-hex-converter untuk mengkonversi desimal ke heksadesimal
Salin bilangan heksadesimal hasil konversi
Akses situs https://joshwp.com/free-hex-to-text-converter/ untuk mengkonversi heksadesimal ke plain text, tempelkan bilangan heksadesimal ke inputan dan convert

Maka akan didapatkan flag
0 Comments