You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
python solve.py --verbose --private -N 460657813884289609896372056585544172485318117026246263899744329237492701820627219556007788200590119136173895989001382151536006853823326382892363143604314518686388786002989248800814861248595075326277099645338694977097459168530898776007293695728101976069423971696524237755227187061418202849911479124793990722597 -e 1
DEBUG: factor N: try past ctf primes
Traceback (most recent call last):
File "solve.py", line 149, in
attackobj.attack()
File "$mypath$/CTF-RSA-tool/lib/RSAutils.py", line 128, in attack
factors = factor_N.solve(self.n, self.e, self.c, self.sageworks)
File "$mypath$/CTF-RSA-tool/lib/factor_N.py", line 19, in solve
return pastctfprimes(N) or noveltyprimes(N) or wiener_attack(N, e) or factordb(N) or comfact_cn(N, c) or smallq(N) or p_q_2_close(N) or None
File "$mypath$/CTF-RSA-tool/lib/factor_N.py", line 96, in pastctfprimes
) if not x.startswith('#') and not x.startswith('\n')]
ValueError: invalid literal for long() with base 10: '\r\n'
The text was updated successfully, but these errors were encountered:
add codeand not x.startswith('\r\n')into CTF-RSA-tool/lib/factor_N.py", line 96 can solve it
primes = [long(x) for x in open(os.path.dirname(__file__)+ '/pastctfprimes.txt', 'r').readlines(
) if not x.startswith('#') and not x.startswith('\n')and not x.startswith('\r\n')]
python solve.py --verbose --private -N 460657813884289609896372056585544172485318117026246263899744329237492701820627219556007788200590119136173895989001382151536006853823326382892363143604314518686388786002989248800814861248595075326277099645338694977097459168530898776007293695728101976069423971696524237755227187061418202849911479124793990722597 -e 1
DEBUG: factor N: try past ctf primes
Traceback (most recent call last):
File "solve.py", line 149, in
attackobj.attack()
File "$mypath$/CTF-RSA-tool/lib/RSAutils.py", line 128, in attack
factors = factor_N.solve(self.n, self.e, self.c, self.sageworks)
File "$mypath$/CTF-RSA-tool/lib/factor_N.py", line 19, in solve
return pastctfprimes(N) or noveltyprimes(N) or wiener_attack(N, e) or factordb(N) or comfact_cn(N, c) or smallq(N) or p_q_2_close(N) or None
File "$mypath$/CTF-RSA-tool/lib/factor_N.py", line 96, in pastctfprimes
) if not x.startswith('#') and not x.startswith('\n')]
ValueError: invalid literal for long() with base 10: '\r\n'
The text was updated successfully, but these errors were encountered: