当前位置:网站首页>JS reverse | m3u8 data decryption of a spring and autumn network
JS reverse | m3u8 data decryption of a spring and autumn network
2022-07-01 12:07:00 【One room】
Statement : This article is for study only , It is forbidden to be used for illegal purposes , Otherwise, we will be responsible for the consequences . If your rights and interests are infringed , Please contact me immediately to delete !
Preface
This is a group friendly demand , Back to m3u8
Data is encrypted , Based on the principle of mutual help , It's easy for him , Also write ( water ) An article .
The target site :
Grab the bag
Old rules , First grab a bag and have a look .
You can see ,m3u8
In this bag data
It's encrypted. , Next, let's do it .
Find the encrypted location
Response data like this is encrypted , You can search for .decrypt
perhaps .decyrpt(
This word is used to locate the location of encryption , This time is also relatively lucky , The search results are relatively few , It's easy to find the corresponding position .
This n.data.data
It's the previous ciphertext .
Encryption logic analysis
Statement to restore data :
r = xxtea.toString(xxtea.decrypt(n.data.data, xxtea.toBytes(i + sectionID)))
This i
It's a bunch of hash
value , Generated by the following code :
e = new Rusha
t = sectionID + "icq"
i = e.digest(t).substr(0, 32)
hold Rusha
Just button it out .
Then separate xxtea.decrypt
and xxtea.toString
Buckle it out , It's not hard , Deduct whatever you lack .
It is worth mentioning that , Need to use atob
Method , It can be used Buffer.from
replace :
var atob = function(a){
return Buffer.from(a, 'base64').toString('binary')
}
The operation effect is as follows :
Finished writing , It seems a little short
Love & Peace, See you later .
边栏推荐
- The specified service is marked for deletion
- Theoretical basis of graph
- Exposure: a white box photo post processing framework reading notes
- Golang des-cbc
- Impressive bug summary (continuously updated)
- Adjacency matrix undirected graph (I) - basic concepts and C language
- 深入理解 grpc part1
- [Yunju entrepreneurial foundation notes] Chapter 7 Entrepreneurial Resource test 2
- 自定义 grpc 插件
- Value/hush in redis
猜你喜欢
Redis' attack tactics
Learning summary on June 28, 2022
The operation process of using sugar to make a large data visualization screen
Consolidate -c operator
Comment Cao définit la décimale de dimension
ABBIRB120工业机器人机械零点位置
邻接矩阵无向图(一) - 基本概念与C语言
如何看懂开发的查询语句
Rural guys earn from more than 2000 a month to hundreds of thousands a year. Most brick movers can walk my way ǃ
Use of easyexcel
随机推荐
Use of easyexcel
Why does the JVM heap memory exceed 32g and pointer compression fail?
Want to ask, is there a discount for opening a securities account? Is it safe to open a mobile account?
241. Design priority for operational expressions: DFS application questions
Learning summary on June 30, 2022
The Missing Semester
redis常识
C#依赖注入(直白明了)讲解 一看就会系列
[MCU] [nixie tube] nixie tube display
leetcode 406. Queue Reconstruction by Height(按身高重建队列)
sshd_ Discussion on permitrotlogin in config
Self organization is the two-way rush of managers and members
[Yunju entrepreneurial foundation notes] Chapter 7 Entrepreneurial Resource test 5
Comment Cao définit la décimale de dimension
C summary of knowledge points 3
Leetcode force buckle (Sword finger offer 31-35) 31 Stack push pop-up sequence 32i II. 3. Print binary tree from top to bottom 33 Post order traversal sequence 34 of binary search tree The path with a
The operation process of using sugar to make a large data visualization screen
指纹浏览器工作原理、使用场景以及重要性简单讲解
Prepare for the Blue Bridge Cup Day10__ PWM control light brightness
Brief explanation of the working principle, usage scenarios and importance of fingerprint browser