根据题名得知是盲注
下载压缩包,wireshark打开
直接导出http对象
找到有=的,一个个记下来
然后放到python转码
a =[102,108,97,103,95,56,97,102,56,101,48,51,99,54,56,57,50,52,55,54,102,56,52,100,49,101,51,52,55,49,56,55,98,50,52,52,57]
b=''
for i in range(0,37):
s=chr(a[i])
b=b+s
print(b)
输出flag_8af8e03c6892476f84d1e347187b2449
flag:flag{8af8e03c6892476f84d1e347187b2449}