Error on Pollard_p_1 attack #10
Closed
Comments
i have the same problem |
Same |
I had the same issue. It is fixable by changing line 49 in p_1.py from 'return 0' to 'return 0,None' |
i have other problem. ./RsaCtfTool.py --publickey ./key.pub --uncipher ./flag.enc [*] Warning: Modulus too large for SIQS attack module |
Interestingly this problem does not arise in previous versions like this fork -> https://github.com/sourcekris/RsaCtfTool |
Merged
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
[*] Performing Pollard_p_1 attack.
Traceback (most recent call last):
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 488, in
attackobj.attack()
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 391, in attack
getattr(self, attack.name)()
File "/home/kali/pentest/tools/RsaCtfTool/RsaCtfTool.py", line 369, in Pollard_p_1
self.pub_key.p, self.pub_key.q = pollard_P_1(self.pub_key.n)
TypeError: 'int' object is not iterable
The text was updated successfully, but these errors were encountered: