Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error on Pollard_p_1 attack #10

Closed
deltaclock opened this issue Jan 18, 2018 · 5 comments
Closed

Error on Pollard_p_1 attack #10

deltaclock opened this issue Jan 18, 2018 · 5 comments

Comments

@deltaclock
Copy link

[*] Performing Pollard_p_1 attack.
Traceback (most recent call last):
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 488, in
attackobj.attack()
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 391, in attack
getattr(self, attack.name)()
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 369, in Pollard_p_1
self.pub_key.p, self.pub_key.q = pollard_P_1(self.pub_key.n)
TypeError: 'int' object is not iterable

@maxitis92
Copy link

i have the same problem

@Nakazona
Copy link

Same

@helmhammerhand
Copy link

I had the same issue. It is fixable by changing line 49 in p_1.py from 'return 0' to 'return 0,None'

@maxitis92
Copy link

i have other problem.

./RsaCtfTool.py --publickey ./key.pub --uncipher ./flag.enc

[*] Warning: Modulus too large for SIQS attack module
[-] Sorry, cracking failed

@pr0mming
Copy link

Interestingly this problem does not arise in previous versions like this fork -> https://github.com/sourcekris/RsaCtfTool

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants