攻防世界misc——stage1

下载得到文件3600c13125fe4443aeef3c55b9c1357b.png
攻防世界misc——stage1_第1张图片010看不出什么问题,上Stegsolve,调到Gray bits,可以清楚地看见左上角二维码
攻防世界misc——stage1_第2张图片扫码,得到一串字符

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

16进制,看到03F3,怀疑是pyc文件,放进010,“paste from hex text”,存储为pyc格式
攻防世界misc——stage1_第3张图片使用反编译工具,可得到python代码,代码最后加上flag(),补全代码,调用函数,输出flag

def flag():
    str = [
        65,
        108,
        112,
        104,
        97,
        76,
        97,
        98]
    flag = ''
    for i in str:
        flag += chr(i)
    
    print (flag)
flag()

攻防世界misc——stage1_第4张图片

你可能感兴趣的:(攻防世界WP,python,网络安全)