/ CTF / HackTheBox Labs / brevimoduli.md
brevimoduli.md
 1  Category: #Crypto 
 2  Rated Difficulty: #VeryEasy 
 3  Personal Difficulty: #Easy 
 4  
 5  We connect to the machine and found that it gave us a [[RSA]] key.
 6  
 7  Checked the code and found that the key is made with 2 numbers. n is hardcoded while e is random product of 2 prime of 110bits.
 8  
 9  After doing some googling we know that it is possible to extract the value of e and n from the key.
10  
11  Once we get e, we get the 2 primes that would multiply into it. [Sagemaths](https://www.sagemath.org/) can be used or find some online service that could also do it.
12  
13  Upon inputting the 2 primes into the server we get more [[RSA]] keys and we kept doing the same thing until we get to the flag
14  
15  ---
16  
17  Learnings:
18  
19  Moduli : Product of 2 primes
20  RSA key uses 2 numbers to generate
21  [More reading](https://www.perplexity.ai/search/what-is-a-nonce-and-how-is-it-eVCLfzg7R6q_39ZvWQ6wdg#8)