Rating:

Question: Flag Format : shellctf{}
files: [script.py](script.py), [values.json](values.json)

1) from values.json

e = 65537
n = 105340920728399121621249827556031721254229602066119262228636988097856120194803
enc_msg = 36189757403806675821644824080265645760864433613971142663156046962681317223254

2) use [RsaCtfTool](https://github.com/Ganapati/RsaCtfTool)
3) `python3 RsaCtfTool.py -n 105340920728399121621249827556031721254229602066119262228636988097856120194803 -e 65537 --uncipher 36189757403806675821644824080265645760864433613971142663156046962681317223254`

output:

Unciphered data :
HEX : 0x0000000000007368656c6c6374667b6b33795f73317a655f6d4074746572247d
INT (big endian) : 185453180567955987067286742617490330426585681406450523077485693
INT (little endian) : 56603502101542516885309888740153031607828169274635448325113252619392540213248
STR : b'\x00\x00\x00\x00\x00\x00shellctf{k3y_s1ze_m@tter$}'

4) **flag: shellctf{k3y_s1ze_m@tter$}**

Original writeup (https://github.com/ivanchubb/CTF-Writeups/tree/main/2021/S.H.E.L.L.%20CTF/BruteForceRSA).