Where there’s a will, there’s a way.
This CTF consists in a Boot2Root virtual machine. The objective is to get root and read de flag.
The main skills used here were scannig/exploiting a vulnerable web application and reversing simple binaries.
A very simple implementation of the RSA algorithm (yet functional use it at your own risk) with the purpose of better understanding the functionalities and applications associated with it. It was developed only for academic scope and should only be used on it.
This work is my first approach into the PKC world. This implementation intends to be a light-weight public-key cryptosystem based on the subset sum problem (a special case of the knapsack problem) which is known to be NP-Complete.
Introducing this 'blog'.