1. create a folder to store the files ```shell= ┌──(kali㉿kali)-[~/code] └─$ mkdir patchme ┌──(kali㉿kali)-[~/code] └─$ cd patchme ``` 2. `wget` the files ```shell= ┌──(kali㉿kali)-[~/code/patchme] └─$ wget https://artifacts.picoctf.net/c/201/patchme.flag.py ``` ```shell= ┌──(kali㉿kali)-[~/code/patchme] └─$ wget https://artifacts.picoctf.net/c/201/flag.txt.enc ``` 3. idk why `./patchme.flag.py` will cause a syntax error (probably because it's not a executable?), so I ran it in VS Code. 4. Here in the source code, we can see that if we sen d the input (`user_pw`): `ak98-=90adfjhgj321sleuth9000`, it's going to decrypt the encoded flag with the key "utilitarian". *(the backslashes (`\`) are used as line continuation characters. They **indicate that the current line of code continues on the next line**. This is often used to improve the readability of code, especially when a single line of code is very long and you want to break it up into multiple lines.)*![](https://hackmd.io/_uploads/BkVrjk5n3.png)