当前位置:网站首页>Extremely Knowing v2 Analysis
Extremely Knowing v2 Analysis
2022-07-30 15:32:00 【Archaeologist lx (Li Xi)】
案例地址:geetest.com/Register
案例内容:Analyzing the detection when logging inV2提交的Request Payload信息.
The content of the article is only for learning reference,如有侵权请联系作者进行删除

接口分析
POST请求
加密Payload:
参数定位
长话短说,通过XHR断点.

往回走5You can see where the parameters are generated.

According to the debug information and the value in the interface comparison,发现e = DWYi[ymDv(1137)](l)是payload的其中一部分.
继续调试,发现代码:e + h[AUJ_(1173)]
Combining debugging information to draw conclusions:payload = DWYi[ymDv(1137)](l) + h[AUJ_(1173)]
h[AUJ_(1173)]
经测试,h是动态的,其中的aeskey和rsa的值不固定.
再次分析源码,可知 h = o[AUJ_(1156)]()
继续调试,AUJ_(1156) = ‘LpFU’
双击点进去,找到对应的方法.
Put the contents of this file in Lxtools Dissolve the confusion,Variable names are restored.
The overall code structure after copying to local formatting is as follows:
Discovery is a self-executing method,After manual processing, it can be changed to the following:

Then make up the environment according to the error,Such as these appear
Run it again after finishing,会返回MlHc. Then modify the code,让其返回 LkEB['prototype'].LpFU().
运行测试,成功打印了 o[AUJ_(1156)](),raised from itrsa参数即可.
DWYi[ymDv(1137)](l)
Check out the meanings first,其中 l 是EbF_[ymDv(409)](e, h[ymDv(1194)]),调用方法为DWYi['tc_t']
先看 l
Know it here aeskey It is analyzed from the first paragraph of our analysis o[AUJ_(1156)]() extracted from the object.
此处的e actions are includedid、行为轨迹,and unknown parameters.
EbF_[ymDv(409)]是对应的encrypt加密方法.Available locallyJOOO返回,JOOO在EbF_中.
那可以直接使用 EbF_.encrypt()to call the encryption method.
即:EbF_.encrypt(e, h[ymDv(1194)])

本地调用,成功生成 l .
调用tc_t
有了l 之后,We are making upJS中直接调用DWYi.tc_t(l) 即可.
总体流程:
// 注册 _asekey_rsa
_asekey_rsa = LkEB['prototype'].LpFU()
rsa = _asekey_rsa.rsa
aeskey = _asekey_rsa.aeskey
// 生成 l
var l = EbF_.encrypt(e,aeskey)
// 加密后拼接
return DWYi.tc_t(l)+rsa
打印结果:
总结
The main content is process analysis and processing and calling of obfuscated code.
The content of the article is only the skin of the relatively well-informed detection,only analyzedPayload参数,In-depth detection and analysis is a long way to go.
The auxiliary code for this article is in the official account《Pythonlx》回复 shenzhi 领取.

边栏推荐
- Mac 中 MySQL 的安装与卸载
- Huawei issues another summoning order for "Genius Boys"!He, who had given up an annual salary of 3.6 million, also made his debut
- Memory-mapped, bit-band operations
- How to use Databricks for data analysis on TiDB Cloud | TiDB Cloud User Guide
- 编译、链接 - 笔记 - 3
- 那些破釜沉舟入局Web3.0的互联网精英都怎么样了?
- 智能合约安全——私有数据访问
- canal抓取数据
- A simple change for problem, knapsack problem sets of shell
- Android jump to google app market
猜你喜欢
随机推荐
Distributed pre-course: MySQL implements distributed locks
[Enlightenment by Opportunity-53]: "Sushu"-3- Self-cultivation and Self-cultivation
如何做好技术选型
Get the Google Advertising ID as a unique identifier
1222. 可以攻击国王的皇后-力扣双百代码
How is the B+ tree index page size determined?
CS内网横向移动 模拟渗透实操 超详细
华为无线设备Mesh配置命令
组态 - 笔记
Redis 缓存穿透、击穿、雪崩以及一致性问题
MongoDB starts an error Process: 29784 ExecStart=/usr/bin/mongod $OPTIONS (code=exited, status=14)
Mac 中 MySQL 的安装与卸载
LeetCode_98_验证二叉搜索树
Flink本地UI运行
What is the relationship between the construction of smart cities and 5G technology in the new era
Hello, World
关于MySQL主从复制的数据同步延迟问题
Sentinel
Huawei issues another summoning order for "Genius Boys"!He, who had given up an annual salary of 3.6 million, also made his debut
MASM32v11编程调用Process32First失败: 程序发出命令,但命令长度不正确








![[Cloud native] Alibaba Cloud ARMS business real-time monitoring](/img/e7/55f560196521d22f830b2caf110e34.png)
