下载题目附件,是一张图片,使用stegsolve打开在通道Red plane 1中发现一张二维码
使用在线工具解密Barcode Reader. Free Online Web Application (inliteresearch.com)
得到一段16进制数据
03F30D0A79CB05586300000000000000000100000040000000730D0000006400
008400005A000064010053280200000063000000000300000016000000430000
0073780000006401006402006403006404006405006406006407006403006408
00640900640A00640600640B00640A00640700640800640C00640C00640D0064
0E00640900640F006716007D00006410007D0100781E007C0000445D16007D02
007C01007400007C0200830100377D0100715500577C01004748640000532811
0000004E6966000000696C00000069610000006967000000697B000000693300
0000693800000069350000006937000000693000000069320000006934000000
69310000006965000000697D0000007400000000280100000074030000006368
72280300000074030000007374727404000000666C6167740100000069280000
000028000000007304000000312E7079520300000001000000730A0000000001
480106010D0114014E2801000000520300000028000000002800000000280000
00007304000000312E707974080000003C6D6F64756C653E0100000073000000
00
将其复制到winhex中
发现有py字样,猜测为pyc文件,保存为pyc文件,使用网上在线工具反编译pyc文件
在线Python pyc文件编译与反编译 (lddgo.net)
运行得到flag
flag{38a57032085441e7}