下载得到文件3600c13125fe4443aeef3c55b9c1357b.png
010看不出什么问题,上Stegsolve,调到Gray bits,可以清楚地看见左上角二维码
扫码,得到一串字符
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
16进制,看到03F3,怀疑是pyc文件,放进010,“paste from hex text”,存储为pyc格式
使用反编译工具,可得到python代码,代码最后加上flag(),补全代码,调用函数,输出flag
def flag():
str = [
65,
108,
112,
104,
97,
76,
97,
98]
flag = ''
for i in str:
flag += chr(i)
print (flag)
flag()