From 721a9411b3c0d2b3dd9edf01426154205fdb9946 Mon Sep 17 00:00:00 2001 From: Bill Buchanan Date: Mon, 27 Feb 2023 21:56:29 +0000 Subject: [PATCH] Update README.md --- z_ctf/README.md | 86 ++++++++++++++++++++++++------------------------- 1 file changed, 43 insertions(+), 43 deletions(-) diff --git a/z_ctf/README.md b/z_ctf/README.md index ab25f63..edfa808 100644 --- a/z_ctf/README.md +++ b/z_ctf/README.md @@ -4,16 +4,16 @@ These are a collection of CTFs related to encryption. Bob has encrypted this RSA key pair with 128-bit AES. But he can't remember the password he applied. All he can remember is that it might have been his favouriate colour. Can you determine the two prime numbers (in hex) which make up the modulus? ``` -----BEGIN ENCRYPTED PRIVATE KEY----- -MIIBvTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIZY3Pgqla6lACAggA -MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAECBBCcN0BAWWQwD5+pgSGvnHOpBIIB -YGdKvIl5FzpYbFa7pKWUKyQlKY/QxA4Jhh6iMNU1osXVvczb08lFf7q1tB3Q4QTz -Z8LZaQdnfD5ZGyUbOkEAZnIGThtClqGQQoxwMx226n5efyQvkhCjSfpLFHboY2m1 -+tG3OvoO/BmRDbY5PGWURGGwXgsFCgLgV7OfqC6qCfYqPtgBFbNjVZQSM6ojC7dd -p6x3FnU9wvEuVbkuyHjTgVgA8CegeRY+hSXAprd2SD46Y6JqjLHoCA+jbLqJtsXW -cJo88VgUfaz08Ehr4t+gQxl0vS0bm6bevbI1Boe9rQgKGThrqqWrvTXlY17nK48m -4W+Si67DeIIBG5JHIHWQ45Gh/zdjxZdjFXGZi+VSNfgryDPWViPZuhxvR7t1UKpo -JQpHMvfLrgOeLzO5uH8ToAzySJxXIsJKqKXdL7Y41wyF9+C/ahbZppMzzANrjhWc -pXVqFsHfEJRcW9zZXuxCk20= +MIIBvTBXBgkqhkiG9w0BBQ0wSjApBgkqhkiG9w0BBQwwHAQIzZS/FkAl8o8CAggA +MAwGCCqGSIb3DQIJBQAwHQYJYIZIAWUDBAECBBDQG9NEvzkLxz9ywcanUMSQBIIB +YJgi4T/Ko02Uwc2rYbWtXmgElqtso2LmSSOLQ6SyTOqaNvOiCn3F+AmUpF4XGHuH +2Oig7U9afUfnk9MAqQf+/hSi5Lc+kbyvLCJjy881Gd8URiqNDhfQM9B0PUljnPY6 +de4rGXAg9rzqIfpOxfNEggADegEEN8T1EdxWtrFLViEuZ11h1FWQ92Nsiv9HUi3T +36dC+zRgKeeze2C0REPtd7xWugHocyQL+YtGtGGbSUnukhrTAXAFsZxNDQfy+D9U +o8B3YhPUC1z47nhhmTNtVYiIvFgDDJCa9NOPPnOQ4G5rwcLgpbplsksXfXLM/ONj +gCnrJ7dIt+1ZXsr9K+oynBw86hVBppiQhVar19B4ftPfWDoSieKBuihwIYW0mXqT +P0Jn92jXdCHM0b/9NwO9XkFNvGCRetJHnXuY7oD/7HRH9WkcftloO0r/cAxW0JVl +uvAJRPcSU9/nYqpQT6uOwXQ= -----END ENCRYPTED PRIVATE KEY----- ``` The method is defined [https://asecuritysite.com/openssl/rsa_keygen2](https://asecuritysite.com/openssl/rsa_keygen2). @@ -23,48 +23,48 @@ For this we can basically try with a batch file, and substitute colours. This on % cat 1.key | openssl rsa -passin pass:blue -text Private-Key: (512 bit, 2 primes) modulus: - 00:c3:da:b8:08:4e:88:5e:23:11:52:e0:b8:25:42: - 52:40:40:22:58:5d:80:f7:34:2b:f6:ff:5d:1f:7e: - e3:1d:29:9f:65:77:6d:71:76:97:57:5f:f8:d7:4d: - b8:9c:0a:4f:7e:93:ff:f5:46:8f:e8:c1:89:b5:b1: - a2:1e:64:23:71 + 00:eb:3a:72:f0:05:d5:3f:de:f9:5e:7f:77:0a:86: + f0:a4:bd:ca:51:d1:ac:a7:6a:a7:1d:af:9b:dd:cc: + a1:37:c5:12:0c:59:57:4d:59:d8:d4:b8:fa:7c:34: + d8:8b:ab:e6:5b:5e:2e:f1:85:48:27:89:45:bc:cc: + 3a:1f:71:ee:31 publicExponent: 65537 (0x10001) privateExponent: - 14:31:67:ca:0b:76:c9:e5:e9:b2:56:d3:05:9c:69: - e8:8f:f4:3a:92:21:6a:db:69:31:05:31:2f:bf:20: - 61:70:2b:ef:1e:b4:a8:40:23:6b:1c:fd:58:0e:66: - aa:0c:d4:e1:3c:47:a2:8b:08:f2:a6:5a:c2:1e:7d: - 76:d4:bd:f5 + 00:b4:bc:85:21:9d:29:bb:d8:a3:fc:12:ae:31:9d: + 7a:fa:e9:84:b1:97:0c:34:da:82:ab:11:8a:0e:42: + b3:40:b8:26:c5:9e:8a:4e:a9:9d:a2:df:a9:e6:e4: + 89:fa:6b:f1:5e:b4:14:12:60:e4:0f:89:45:b9:db: + 6c:ba:eb:45:1d prime1: - 00:ec:14:d3:2a:06:c3:bf:0d:68:e0:83:3f:7c:7f: - ec:87:16:30:dd:9a:bc:57:0d:e7:0b:db:39:16:5b: - 12:4c:df + 00:f8:07:29:8d:3e:20:d4:ee:1d:0d:fd:36:cd:26: + 36:d2:15:5d:f2:3e:6b:fd:ee:2c:29:01:98:4f:a8: + 68:6f:63 prime2: - 00:d4:61:05:b7:59:ff:93:ee:91:33:56:fb:87:86: - 68:4e:fa:82:8c:10:68:85:b3:70:9e:f2:c8:e1:a3: - ca:49:af + 00:f2:c9:f7:bf:f2:50:e7:2a:02:8c:74:04:e0:c0: + b2:d5:9d:b9:fb:d8:d4:eb:5b:33:53:87:ae:86:c8: + 7b:32:5b exponent1: - 74:62:ab:db:bb:2c:03:63:24:02:13:12:58:59:64: - 8d:10:56:94:d9:74:e2:61:fb:36:b0:23:cb:ae:a8: - 2d:f7 + 5b:d0:2a:ed:82:06:1d:4c:57:ad:0a:02:f3:46:26: + 1c:f6:93:e4:4c:7f:25:6c:b9:24:24:d7:01:05:d2: + 43:09 exponent2: - 00:9e:cf:da:85:6c:20:49:0f:d9:b6:69:71:f7:bb: - 13:5f:13:c6:f1:54:07:c5:0b:14:c9:57:45:ce:2d: - 3b:c4:73 + 00:95:a8:a5:cd:6e:43:2c:9b:9a:c2:95:69:c4:59: + 44:63:a5:3c:55:e0:4d:2f:5f:22:7e:64:ee:d2:2a: + 96:b6:6d coefficient: - 00:95:4f:6d:16:84:7f:2b:cc:ca:c9:19:0d:81:db: - 42:b7:ef:82:3c:8c:4d:3c:96:55:32:2c:01:92:c7: - 5e:f1:69 + 3f:01:70:5e:21:bc:ff:6c:a1:a9:23:ff:9f:15:76: + ab:a0:29:f0:cb:a4:71:51:da:2f:06:cb:ac:ad:00: + b9:75 writing RSA key -----BEGIN PRIVATE KEY----- -MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEAw9q4CE6IXiMRUuC4 -JUJSQEAiWF2A9zQr9v9dH37jHSmfZXdtcXaXV1/41024nApPfpP/9UaP6MGJtbGi -HmQjcQIDAQABAkAUMWfKC3bJ5emyVtMFnGnoj/Q6kiFq22kxBTEvvyBhcCvvHrSo -QCNrHP1YDmaqDNThPEeiiwjyplrCHn121L31AiEA7BTTKgbDvw1o4IM/fH/shxYw -3Zq8Vw3nC9s5FlsSTN8CIQDUYQW3Wf+T7pEzVvuHhmhO+oKMEGiFs3Ce8sjho8pJ -rwIgdGKr27ssA2MkAhMSWFlkjRBWlNl04mH7NrAjy66oLfcCIQCez9qFbCBJD9m2 -aXH3uxNfE8bxVAfFCxTJV0XOLTvEcwIhAJVPbRaEfyvMyskZDYHbQrfvgjyMTTyW -VTIsAZLHXvFp +MIIBVQIBADANBgkqhkiG9w0BAQEFAASCAT8wggE7AgEAAkEA6zpy8AXVP975Xn93 +CobwpL3KUdGsp2qnHa+b3cyhN8USDFlXTVnY1Lj6fDTYi6vmW14u8YVIJ4lFvMw6 +H3HuMQIDAQABAkEAtLyFIZ0pu9ij/BKuMZ16+umEsZcMNNqCqxGKDkKzQLgmxZ6K +Tqmdot+p5uSJ+mvxXrQUEmDkD4lFudtsuutFHQIhAPgHKY0+INTuHQ39Ns0mNtIV +XfI+a/3uLCkBmE+oaG9jAiEA8sn3v/JQ5yoCjHQE4MCy1Z25+9jU61szU4euhsh7 +MlsCIFvQKu2CBh1MV60KAvNGJhz2k+RMfyVsuSQk1wEF0kMJAiEAlailzW5DLJua +wpVpxFlEY6U8VeBNL18ifmTu0iqWtm0CID8BcF4hvP9soakj/58VdqugKfDLpHFR +2i8Gy6ytALl1 -----END PRIVATE KEY----- ``` ## Cracking RSA with Chinese Remainder Theory - Håstad’s Broadcast