Flag name: HTTP flag Anticipated level: Easy-Medium Description: If you investigate the given files properly you can find out a python code in “http-server” file. print(”.join(chr(int(‘010100110100001001000011010101000100011001111011001101110100100000110011010100110011001101011111010011010011000101010011010000110101001101011111010000010101001000110011010111110100011100110000010010010100111001000111010111110101001100110000010111110011001101000001010100110101100101111101′[i*8:i*8+8],2)) for i in range(len(‘01010011010000100100001101010100010001100111101100110111010010000011001101010011001100110101111101001101001100010101001101000011010100110101111101000001010100100011001101011111010001110011000001001001010011100100011101011111010100110011000001011111001100110100000101010011010110010111110’)//8))) Run the command to get the flag: SBCTF{7H3S3_M1SCS_AR3_G0ING_S0_3ASY}