# Adworld - 適合作為桌面 ###### tags: `Adworld` `CTF` `Misc` Challenge: [適合作為桌面](https://adworld.xctf.org.cn/challenges/details?hash=7a4e06c0-811c-4493-a628-886dc5bd59b4_2&task_category_id=1) ## Background [Day8 Python基礎-pyc是什麼](https://ithelp.ithome.com.tw/articles/10185442) ## Exploit 1. Analyze Steganography ![](https://i.imgur.com/AwAHrxC.png) 2. [QR Code Reader](https://products.aspose.app/barcode/recognize/qr#/recognized) ```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``` It seems a byte code of a file. 3. HxD ![](https://i.imgur.com/ntC6hJ3.png) It can be disassembled by pyc tools. 4. [`pyc` disassemble](https://tool.lu/pyc/) :::spoiler ```python= def flag(): str = [ 102, 108, 97, 103, 123, 51, 56, 97, 53, 55, 48, 51, 50, 48, 56, 53, 52, 52, 49, 101, 55, 125, ] flag = "" for i in str: flag += chr(i) print flag ``` ::: ## Reference [XCTF练习题---MISC---适合作为桌面](https://zhuanlan.zhihu.com/p/410858901)