You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We know [this binary](Pwnable/P400-InsaneInTheBlockChain/bin/geth) was used to sign it.
8
+
We know [this binary](bin/geth) was used to sign it.
9
9
10
10
Extract the private key used to sign this transaction.
11
11
@@ -38,5 +38,5 @@ Two possible approaches
38
38
* Analytical method
39
39
* Perform two signatures with some key
40
40
* Google "edsa k reuse". Use [this tool](https://github.com/tintinweb/ecdsa-private-key-recovery)
41
-
* Alternatively, having a known key allows us to extract `k` directly. Having `k` allows us to extract the private key from only transaction only. Check out the [solution file](Pwnable/P400-InsaneInTheBlockChain/solution/solution.py)
41
+
* Alternatively, having a known key allows us to extract `k` directly. Having `k` allows us to extract the private key from only transaction only. Check out the [solution file](solution/solution.py)
0 commit comments