当前位置:网站首页>Extremely Knowing v2 Analysis
Extremely Knowing v2 Analysis
2022-07-30 15:32:00 【Archaeologist lx (Li Xi)】
案例地址:geetest.com/Register
案例内容:Analyzing the detection when logging inV2提交的Request Payload信息.
The content of the article is only for learning reference,如有侵权请联系作者进行删除

接口分析
POST请求
加密Payload:
参数定位
长话短说,通过XHR断点.

往回走5You can see where the parameters are generated.

According to the debug information and the value in the interface comparison,发现e = DWYi[ymDv(1137)](l)是payload的其中一部分.
继续调试,发现代码:e + h[AUJ_(1173)]
Combining debugging information to draw conclusions:payload = DWYi[ymDv(1137)](l) + h[AUJ_(1173)]
h[AUJ_(1173)]
经测试,h是动态的,其中的aeskey和rsa的值不固定.
再次分析源码,可知 h = o[AUJ_(1156)]()
继续调试,AUJ_(1156) = ‘LpFU’
双击点进去,找到对应的方法.
Put the contents of this file in Lxtools Dissolve the confusion,Variable names are restored.
The overall code structure after copying to local formatting is as follows:
Discovery is a self-executing method,After manual processing, it can be changed to the following:

Then make up the environment according to the error,Such as these appear
Run it again after finishing,会返回MlHc. Then modify the code,让其返回 LkEB['prototype'].LpFU().
运行测试,成功打印了 o[AUJ_(1156)](),raised from itrsa参数即可.
DWYi[ymDv(1137)](l)
Check out the meanings first,其中 l 是EbF_[ymDv(409)](e, h[ymDv(1194)]),调用方法为DWYi['tc_t']
先看 l
Know it here aeskey It is analyzed from the first paragraph of our analysis o[AUJ_(1156)]() extracted from the object.
此处的e actions are includedid、行为轨迹,and unknown parameters.
EbF_[ymDv(409)]是对应的encrypt加密方法.Available locallyJOOO返回,JOOO在EbF_中.
那可以直接使用 EbF_.encrypt()to call the encryption method.
即:EbF_.encrypt(e, h[ymDv(1194)])

本地调用,成功生成 l .
调用tc_t
有了l 之后,We are making upJS中直接调用DWYi.tc_t(l) 即可.
总体流程:
// 注册 _asekey_rsa
_asekey_rsa = LkEB['prototype'].LpFU()
rsa = _asekey_rsa.rsa
aeskey = _asekey_rsa.aeskey
// 生成 l
var l = EbF_.encrypt(e,aeskey)
// 加密后拼接
return DWYi.tc_t(l)+rsa
打印结果:
总结
The main content is process analysis and processing and calling of obfuscated code.
The content of the article is only the skin of the relatively well-informed detection,only analyzedPayload参数,In-depth detection and analysis is a long way to go.
The auxiliary code for this article is in the official account《Pythonlx》回复 shenzhi 领取.

边栏推荐
- 关于MySQL主从复制的数据同步延迟问题
- 【回归预测-lssvm分类】基于最小二乘支持向量机lssvm实现数据分类代码
- canal scrape data
- 存储器映射、位带操作
- Understand Chisel language. 28. Chisel advanced finite state machine (2) - Mealy state machine and comparison with Moore state machine
- 基于5G的仓储信息化解决方案2022
- [机缘参悟-53]:《素书》-3-修身养志[求人之志章第三]
- 瑞吉外卖项目实战Day02
- The evolution of content products has three axes: traffic, technology, and product form
- What is Ts?
猜你喜欢

952. 按公因数计算最大组件大小 : 枚举质因数 + 并查集运用题

【回归预测-lssvm分类】基于最小二乘支持向量机lssvm实现数据分类代码

1222. 可以攻击国王的皇后-力扣双百代码

Use of SLF4J

Mac 中 MySQL 的安装与卸载

惊艳!京东T8纯手码的Redis核心原理手册,基础与源码齐下

Office Automation | Office Software and Edraw MindMaster Shortcuts

从实例来看DAO:权力分散的伟大尝试

【云原生 • DevOps】influxDB、cAdvisor、Grafana 工具使用详解

(Crypto必备干货)详细分析目前NFT的几大交易市场
随机推荐
ESP32 Repeated Reboot Issue Arduino Shield Power Outage Detector
Fink异步IO的实战(关联维表)
关于mariadb/mysql的user表:密码正确但登录失败,可能与mysql的空用户有关
异常情况处置方案
分布式限流 redission RRateLimiter 的使用及原理
InputStream和OutputStream流的使用
存储器映射、位带操作
ISELED---氛围灯方案的新选择
Flink实时仓库-DWS层(状态编程,windowall的使用,数据保存到clickhouse)模板代码
SLF4J的使用
机房布线的至高境界,美到窒息
Get the Google Advertising ID as a unique identifier
Sleuth+Zipkin(可视化) 服务链路追踪
SQL 优化这么做就对了!
MongoDB starts an error Process: 29784 ExecStart=/usr/bin/mongod $OPTIONS (code=exited, status=14)
学习 MySQL 需要知道的 28 个小技巧
JVM performance tuning
Alluxio for Presto fu can across the cloud self-service ability
B+树索引页大小是如何确定的?
MaxWell抓取数据