当前位置:网站首页>JS reverse | m3u8 data decryption of a spring and autumn network
JS reverse | m3u8 data decryption of a spring and autumn network
2022-07-01 12:07:00 【One room】
Statement : This article is for study only , It is forbidden to be used for illegal purposes , Otherwise, we will be responsible for the consequences . If your rights and interests are infringed , Please contact me immediately to delete !
Preface
This is a group friendly demand , Back to m3u8 Data is encrypted , Based on the principle of mutual help , It's easy for him , Also write ( water ) An article .
The target site :
Grab the bag
Old rules , First grab a bag and have a look .
You can see ,m3u8 In this bag data It's encrypted. , Next, let's do it .
Find the encrypted location
Response data like this is encrypted , You can search for .decrypt perhaps .decyrpt( This word is used to locate the location of encryption , This time is also relatively lucky , The search results are relatively few , It's easy to find the corresponding position .
This n.data.data It's the previous ciphertext .
Encryption logic analysis
Statement to restore data :
r = xxtea.toString(xxtea.decrypt(n.data.data, xxtea.toBytes(i + sectionID)))
This i It's a bunch of hash value , Generated by the following code :
e = new Rusha
t = sectionID + "icq"
i = e.digest(t).substr(0, 32)
hold Rusha Just button it out .
Then separate xxtea.decrypt and xxtea.toString Buckle it out , It's not hard , Deduct whatever you lack .
It is worth mentioning that , Need to use atob Method , It can be used Buffer.from replace :
var atob = function(a){
return Buffer.from(a, 'base64').toString('binary')
}
The operation effect is as follows :
Finished writing , It seems a little short
Love & Peace, See you later .
边栏推荐
- Joint Time-Frequency and Time Domain Learning for Speech Enhancement
- Interpretation of R & D effectiveness measurement framework
- Harbor webhook from principle to construction
- [Yunju entrepreneurial foundation notes] Chapter 7 Entrepreneurial Resource test 4
- [Yunju entrepreneurial foundation notes] Chapter 7 Entrepreneurial Resource test 5
- The Missing Semester
- 我在中山,到哪里开户比较好?实际上网上开户安全么?
- Value/sortedset in redis
- 91.(cesium篇)cesium火箭发射模拟
- [Yunju entrepreneurial foundation notes] Chapter 7 Entrepreneurial Resource test 2
猜你喜欢

GID: open vision proposes a comprehensive detection model knowledge distillation | CVPR 2021

Joint Time-Frequency and Time Domain Learning for Speech Enhancement

Adjacency matrix undirected graph (I) - basic concepts and C language

Powerful, easy-to-use, professional editor / notebook software suitable for programmers / software developers, comprehensive evaluation and comprehensive recommendation

博途V15添加GSD文件

Redis' attack tactics

基于IMDB评论数据集的情感分析

Comment Cao définit la décimale de dimension

Redis的攻击手法

On recursion and Fibonacci sequence
随机推荐
Why does the JVM heap memory exceed 32g and pointer compression fail?
Learning summary on June 30, 2022
指定的服务已标记为删除
强大、好用、适合程序员/软件开发者的专业编辑器/笔记软件综合评测和全面推荐
NOV Schedule for . Net to display and organize appointments and recurring events
博途V15添加GSD文件
Binary stack (I) - principle and C implementation
Learning summary on June 29, 2022
MQ-防止消息丢失及重复消费
Technology sharing | MySQL: how about copying half a transaction from the database?
对于mvvm和mvc的理解
LeetCode 454. Add four numbers II
GID:旷视提出全方位的检测模型知识蒸馏 | CVPR 2021
Computer graduation project asp Net hotel room management system VS development SQLSERVER database web structure c programming computer web page source code project
usb peripheral 驱动 - cable connect/disconnect
redis中value/list
91. (cesium chapter) cesium rocket launch simulation
华为HMS Core携手超图为三维GIS注入新动能
91.(cesium篇)cesium火箭发射模拟
Le semester manquant