A short challenge: picoCTF reverse engineering

Screenshot of the challenge
wget  https://mercury.picoctf.net/static/77a2b202236aa741e988581e78d277a6/enc
Google Translate was not useful
string = 'Hola'first_part = ord(string[0])
print(f'First byte {first_part}')
first_part_shifted = first_part << 8
print(f'First byte shifted {first_part_shifted}')
second_part = ord(string[1])
print(f'Second part {second_part}')
added_elements = first_part_shifted + second_part
print(f'added_elements = {added_elements}')
first_two_letters = chr(added_elements)
print(f'First two letters: {first_two_letters}')
Results of executing the code above
Results of execution, with badly redacted flag
The oneliner I found after making a 10 line solution

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store