
enc is encrypted in RSA 64 bit chunks you can ignore it) I have spent weeks over this experiment, and I'm on the verge of crying now if I don't decrypt this and get the password to the next level.Ĭould someone please quickly verify what I've done is right, and they are getting the same hex sequence after decryption? Here are the files in a tarball:

As I said, I was supposed to get a password one way or another after decryption. vVAAAAAAAAaQUAAAgAAA0goAABFJF69tm6AAKSL17bN0AAABJDAAAAA/6WXHFvĪlso, '2F 2F' is not a Magic Number and does not indicate a file type. When I convert this to ASCII, I get nonsense: Where, 'c' is the ciphertext, 'd' is the private exponent, 'N' is the modulus and 'm' is supposed to contain the plaintext hex bytes. This created a hex dump of the file called 'enc.hex'. I have used xxd to extract the hex data from the ciphertext file: xxd -p > enc.hex


I was supposed to get a password or secret key. What I got as a result, was nonsense hex.

I had the public key, I factored it, obtained the private exponent, and decrypted the. enc RSA (encrypted) file that was most likely generated using openssl.
