Web-CringeNcoder
分析过程
就是一道编码解码题,没什么难度,刚开始以为是sql,后边又以为是模板注入,最后访问/flag,就明白了这道题的用意。
解题脚本
1 | dict = {"cringe":"a", "cr1nge":"b","cRinge":'c',"crIng3":'d',"cRimG3":'e',"cR1Ng3e":'f',"criNgee":'g',"CRINGE":'h',"crinGE":'i',"ccR1nge":'j',"CriNGE":'k',"cRINGe":'l',"cr1ngE":'m',"cringE":'n',"CRIng3":'o',"Cr1nGe":'p',"cR1nnge":'q',"cR1Ng3":'r',"CrInGe":'s',"cRingE":'t',"cR1NGE":'u',"CRiNg3":'v',"CRINGe":'w',"CR1NGe":'x',"cring3":'y',"CRIMNGE":'z',"crinG3":1, "cRInge":2,"cRinG3":3 ,"criNG3":4 ,"cr1NG3":5 ,"crinGe":6,"cRiNge":7, "CrInGE":8 ,"CRinGE":9,"cRInGE":0} |