Aptio_V_AMI_Firmware_Update_Utility 5.12最新英文版
Aptio_V_AMI_Firmware_Update_Utility 5.12 最新版英文版 关联5.08 5.05
rsa加密攻击源程序
rsa加密攻击源程序 C语言
This tool is supposed to help crackers who are cracking targets
protected by RSA and who aren't attackable by the classic method of
factoring i.e who'se modulus is > 400 bits.
.How to use
***********
It's very easy to use it once you know the when the attacks
apply.So here are the explanations:
1.Common Modulus Attack: not really an attack but more of a tool, its
purpose is to find the factors of the modulus given the public AND
secret key, i.e E and D
So entering N,D,E you find P,Q so that N = P * Q.
I included it in this 'toolkitt' as i got asked many times
by other crackers if you can find the factors of N given D and E is
possible. The answer is yes. The algo which i used can be found here:
http://math.usask.ca/~wurtz/crypt/attacks_rsa/node1.html
2. Weger Attack: this attack applies when the factors of N are close
one another i.e the diference |P - Q| is small in comparison to P and Q.
So if let's say P and Q have the same bitsize s than for the
RSA key to be susceptible to this attack then |P-Q| bitsize must
be smaller then (s/2)
E.g. P bitsize=256 bits
Q bitsize=256 bits
|P-Q| bitsize is 100bits then they key generated with this
primes is attackble.
When testing a RSA key for this attack if you don't get any
result after at most 5mins then the attack don't work.
BTW: you can try this attack on Amenesia Basis#1 Crackme that presents
an RSA key with exactly this weakness.
3. Wiener Attack: this attack applies when the private key is
D < (1/3)*N^(1/4) and if P < Q < 2P (which is true most of the
times.).
So if you have an s bit modulus and if the bitsize of the
private key is < (s/4) bits than you can succesfully recover.
The attack can be improved, but i'm lazy so i only did the
easier version :).
4. Low Exponent Attack:
If E=3 and the message is short enough and not padded then
there's a possibility that M^E < N so the modular reductions don't
take place so computing M having the ciphertext is just a matter
of computing the E'th root from the cipher text.
As input you must provide N and the ciphertext
BTW: you can try this attack on Amenesia Basis#2 Crackme that presents
an RSA key with exactly this weakness.
.Bugs
******
Send them to bLaCk@reteam.org or correct them yourself, i gave
you the source right? :)
.Future plans
*************
- add threads for Weger attack
- add Cycling attack - i need to find more info about how to efficiently
implemented (i know it's not an efficient attack from the start but
people asked for it)
- add ? (here you put what you think is missing)
.History
*********
- v.0.1f - added the low public exponent 'attack' :)
- added automatic base convertion, so it's easier to
work with
- added automatic md5 hasher (a request)
- added Encrypt/Decrypt functions to play with
the RSA keys
- v.0.1b - first version released
.Greets
*******
RET, TKM!, KANAL23, LZ0 Members as they all put up with my
stupid questions :P
超强的批量改名软件(可批量改文件名字)
一个供高级用户使用的强大的文件和夹重命名工具。它提供了多种重命名选项,包括删除数字或字符串,替换字符串,插入数字,转换字符,组织数值等等。支持正则表达式,并支持给音频、图像及其他文档更改扩展名。
它还能从包含的信息Tags中 (ID3, EXIF, IPTC, DOC, HTML)智能重命名文件,能创建一个看其名就知其义的文件名。
其他的功能包括文件名预览,创建空文件和文件夹,以及资源管理器右键扩展等。
小巧好用的鼠标点击器AutoClick V2.2
【软件介绍】
小巧好用的鼠标点击器。可以定义次数,可以一直点击。
记得汉化者在玩某款游戏中不停的点击鼠标,然后找到了本软件。
其录制功能十分强大,可以录制点击的先后顺序,然后不停的执行。
【文件结构】
--
|- AutoClick_CHS.exe 主程序
|- 汉化说明.txt
【其他说明】
软件运行后会生成配置文件,不会写注册表。
如果想要不生成配置文件的版本,请单独密我。
软件在录制点击的时候的动态光标在汉化过程中丢失,故替换为其他光标。
另外感谢听雨醉帮忙校正了某些单词。谢谢!
快速查明(判断)程序所用的编程语言及软件壳版本
一款windows下的软件察看软件壳和其他相关信息的软件
批量创建文件夹-帮你轻松搞定
假如你想一下子创建100个或者更多个文件夹,你会怎么办?一个个复制显然是不行的,那么下面的批处理语句可以帮助你轻松搞定:
::------------------------------------------------------------------------------------------
@echo off
for /L %%x in (1,1,10) do md 文件夹%%x
for /L %%x in (1,1,10) do @echo %%x>文件夹%%x\%%x.doc
::------------------------------------------------------------------------------------------
将上面紫色文字复制进记事本另存为:批量.bat
双击运行可在当前文件夹创建10个文件夹,名字分别为:文件夹1、文件夹2、......文件夹10,并且每个文件夹中包含一个word文档.
解释:
1、@echo off 这句非必须,表示不显示运行过程
2、FOR /L %变量 IN (开始,步长,结尾) DO 命令 [命令参数]
该集表示以增量形式从开始到结束的一个数字序列。
因此,(1,1,5) 将产生序列 1 2 3 4 5, (1,2,9) 将产生序列 1 3 5 7 9,(5,-1,1) 将产生序列 (5 4 3 2 1)。
很是实用,特来分享!
ArcMap操作指导书
我从某网站下载整理的ArcMap操作指导书,详细地介绍了arcmap的使用基础,地图编辑,制图输出,统计分析!
一个好玩的flash游戏
一个经典的flash过关游戏,设计的很不错,挺小但是挺经典,也挺有难度的,shift是跳,左右键跑动,是个消磨时间的好东西,不过你得有耐心哦!