stage1
- 用
stegsolve
打开图片,左右切换,发现二维码
- 扫描得到一串十六进制编码
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
- 尝试转换成字符串,显示乱码,但是其中包含test.py这几个字符
- 根据经验我们推断这可能是pyc文件。将这串编码用010editor保存为pyc文件,然后用
uncompyle6
反编译
- 反编译成功,打开py文件
- 调用flag函数得到flag
AlphaLab