当前位置:网站首页>Little red book timestamp2 (2022 / 04 / 22)
Little red book timestamp2 (2022 / 04 / 22)
2022-04-23 14:52:00 【Li Xi】
Received group friend message , The little red book timestamp2 Updated .
Slider problem
It is recommended to delete... During debugging timestamp2 Just go , Don't put all of cookie All deleted , Otherwise, enter the infinite slider . Although only delete timestamp2, The generated parameter values are the same .
When you turn on the console , Put this div Delete and drag .
If you still enter the infinite slider link , Replace IP, It will be unsealed later .
Interface Analysis
Previous registerCanvas The interface has also been updated ,FormData Medium sign Encrypted .
timestamp2 Now the server returns , When you request, you only need to carry timestamp2.
Sign analysis
Take out the ancestral XHR The breakpoint . Input : /v2/shield/registerCanvas , Delete timestamp2 Refresh the page
Take two steps back , You can see the parameters i and u.
Corresponding id and sign.
stay call stack Middle down debugging .
eureka u = I.qrTqB(l, I.PNXDL, JSON[r(1347)](i)) , Print out all the parameters and have a look .
namely :
So the deduction process should be like this
After a while of analysis , Find the key position in I[o(1159)](function(n, t, e) {} here .
I.“uPhZo” = function(n, t, e, r) { return n(t, e, r) },
So the final call is shown in the figure below :
eyJ1c2VyQWdlbnQiOiJNb3ppbGxh yes Browser parameters base64 Later results .
'{"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36","webdriver":false,"language":"zh-CN","colorDepth":24,"deviceMemory":8,"hardwareConcurrency":8,"screenResolution":"1920;1080","availableScreenResolution":"1920;1040","timezoneOffset":-480,"timezone":"Asia/Shanghai","sessionStorage":1,"localStorage":1,"indexedDb":1,"openDatabase":1,"cpuClass":"unknown","platform":"Win32","plugins":["PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf","Chrome PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf","Chromium PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf","Microsoft Edge PDF Viewer::Portable Document Format::application/pdf~pdf,text/pdf~pdf","WebKit built-in PDF::Portable Document Format::application/pdf~pdf,text/pdf~pdf"],"canvas":"10cfbbb02b2606dbc2ccb15a3cd2b558","adBlock":false,"hasLiedLanguages":false,"hasLiedResolution":false,"hasLiedOs":false,"hasLiedBrowser":false,"touchSupport":"0;false;false","fonts":"4;7;8","audio":"124.04347527516074"}'
Deduction code supplement environment
H There are encryption and decryption related variable names in .
In the parameter, it will be judged that encrypt still decrypt, The encryption method will eventually come to case 9 in return T in .
On the problem of complement variable name , You can write a regular unified replacement .
Process summary
Sign The generation process is to put the browser information first base64, Then encrypt to get k,s, And then k and s adopt FbmlO The method is spliced to get b, Then on b Then encrypt to get the final sign value .
版权声明
本文为[Li Xi]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231450357901.html
边栏推荐
- async void 导致程序崩溃
- 多语言通信基础 06 go实现grpc的四种数据流模式实现
- LeetCode167-两数之和II-双指针-二分-数组-查找
- 8.5 循环神经网络简洁实现
- 8.4 循环神经网络从零实现
- 博睿数据携手F5共同构建金融科技从代码到用户的全数据链DNA
- Swift protocol Association object resource name management multithreading GCD delay once
- Outsourcing for four years, abandoned
- LeetCode149-直线上最多的点数-数学-哈希表
- 封面和标题中的关键词怎么写?做自媒体为什么视频没有播放量
猜你喜欢
8.2 文本预处理
面试官:说一下类加载的过程以及类加载的机制(双亲委派机制)
eolink 如何助力遠程辦公
Model location setting in GIS data processing -cesium
LeetCode153-寻找旋转排序数组中的最小值-数组-二分查找
博睿数据携手F5共同构建金融科技从代码到用户的全数据链DNA
Leetcode167 - sum of two numbers II - double pointer - bisection - array - Search
电容
[detailed explanation of factory mode] factory method mode
Comment eolink facilite le télétravail
随机推荐
Epolloneshot event of epoll -- instance program
eolink 如何助力遠程辦公
[stc8g2k64s4] introduction of comparator and sample program of comparator power down detection
UML project example -- UML diagram description of tiktok
Redis主从同步
Daily question - leetcode396 - rotation function - recursion
The difference between having and where in SQL
vscode中文插件不生效问题解决
分享 20 个不容错过的 ES6 的技巧
Realization of four data flow modes of grpc based on Multilingual Communication
Set up an AI team in the game world and start the super parametric multi-agent "chaos fight"
Leetcode153 - find the minimum value in the rotation sort array - array - binary search
raised exception class EAccexxViolation with ‘Access violation at address 45EFD5 in module 出错
Raised exception class eaccexviolation with 'access violation at address 45efd5 in module error
ArrayList collection basic usage
qt之.pro文件详解
QT actual combat: Yunxi calendar
[proteus simulation] automatic range (range < 10V) switching digital voltmeter
Comment eolink facilite le télétravail
Vous ne connaissez pas encore les scénarios d'utilisation du modèle de chaîne de responsabilité?