Rating:
n = 1763350599372172240188600248087473321738860115540927328389207609428163138985769311
e = 65537
c = 33475248111421194902497742876885935310304862428980875522333303840565113662943528
- looks like the problem is asking to exploit a weak key to find the flag.
- did some googling and found [a tool for this very purpose](https://github.com/Ganapati/RsaCtfTool)
`python3 RsaCtfTool/RsaCtfTool.py -n 1763350599372172240188600248087473321738860115540927328389207609428163138985769311 -e 65537 --uncipher 33475248111421194902497742876885935310304862428980875522333303840565113662943528`
Output:
Unciphered data :
HEX : 0x00000000007368656c6c7b737769746368696e5f746f5f6173796d6d65747269637d
INT (big endian) : 3111388068276188662361997958100924356274395167698926770307665056326525
INT (little endian) : 3716857967501616239523840250653395077772235796196542527851123201402003116282347520
STR : b'\x00\x00\x00\x00\x00shell{switchin_to_asymmetric}'
**flag: shell{switchin_to_asymmetric}**