发现是16进制
将其放入winhex中
得到一段数据,开头46ESAB 反转 就是 BASE64
将开头的46ESAB_去掉得到
UEsDBBQAAAAIAAldCFXqOw7cKAAAACYAAAAIAAAAZmxhZy50eHRLy0lMrzZISk02SEwxTkk0MjQ0TjY3SDU1SEsxNTM0T7JINU+zrAUAUEsBAhQAFAAAAAgACV0IVeo7DtwoAAAAJgAAAAgAJAAAAAAAAAAgAAAAAAAAAGZsYWcudHh0CgAgAAAAAAABABgAGxEfk9iq2AEbER+T2KrYAQJF+4rYqtgBUEsFBgAAAAABAAEAWgAAAE4AAAAAAA
由于这段base64长度只有254,需要再添加两个== 号
将其转为16进制得到 可以看出是zip压缩包的文件头
import base64
def base64_to_hex(payload_base64):
bytes_out = base64.b64decode(payload_base64)
str_out = bytes_out.hex()
print("base64_to_hex:",str_out)
return str_out
strings = 'UEsDBBQAAAAIAAldCFXqOw7cKAAAACYAAAAIAAAAZmxhZy50eHRLy0lMrzZISk02SEwxTkk0MjQ0TjY3SDU1SEsxNTM0T7JINU+zrAUAUEsBAhQAFAAAAAgACV0IVeo7DtwoAAAAJgAAAAgAJAAAAAAAAAAgAAAAAAAAAGZsYWcudHh0CgAgAAAAAAABABgAGxEfk9iq2AEbER+T2KrYAQJF+4rYqtgBUEsFBgAAAAABAAEAWgAAAE4AAAAAAA=='
content = base64_to_hex(strings)
print(content)
504b0304140000000800095d0855ea3b0edc280000002600000008000000666c61672e7478744bcb494caf36484a4d36484c314e49343234344e3637483535484b313533344fb248354fb3ac0500504b01021400140000000800095d0855ea3b0edc2800000026000000080024000000000000002000000000000000666c61672e7478740a00200000000000010018001b111f93d8aad8011b111f93d8aad8010245fb8ad8aad801504b050600000000010001005a0000004e0000000000
504b0304140000000800095d0855ea3b0edc280000002600000008000000666c61672e7478744bcb494caf36484a4d36484c314e49343234344e3637483535484b313533344fb248354fb3ac0500504b01021400140000000800095d0855ea3b0edc2800000026000000080024000000000000002000000000000000666c61672e7478740a00200000000000010018001b111f93d8aad8011b111f93d8aad8010245fb8ad8aad801504b050600000000010001005a0000004e0000000000
将其放入winhex中,保存为zip文件,解压得到flag