当前位置:网站首页>Extremely Knowing v2 Analysis
Extremely Knowing v2 Analysis
2022-07-30 15:32:00 【Archaeologist lx (Li Xi)】
案例地址:geetest.com/Register
案例内容:Analyzing the detection when logging inV2提交的Request Payload信息.
The content of the article is only for learning reference,如有侵权请联系作者进行删除
接口分析
POST请求
加密Payload:
参数定位
长话短说,通过XHR断点.
往回走5You can see where the parameters are generated.
According to the debug information and the value in the interface comparison,发现e = DWYi[ymDv(1137)](l)
是payload的其中一部分.
继续调试,发现代码:e + h[AUJ_(1173)]
Combining debugging information to draw conclusions:payload = DWYi[ymDv(1137)](l) + h[AUJ_(1173)]
h[AUJ_(1173)]
经测试,h是动态的,其中的aeskey和rsa的值不固定.
再次分析源码,可知 h = o[AUJ_(1156)]()
继续调试,AUJ_(1156) = ‘LpFU’
双击点进去,找到对应的方法.
Put the contents of this file in Lxtools Dissolve the confusion,Variable names are restored.
The overall code structure after copying to local formatting is as follows:
Discovery is a self-executing method,After manual processing, it can be changed to the following:
Then make up the environment according to the error,Such as these appear
Run it again after finishing,会返回MlHc. Then modify the code,让其返回 LkEB['prototype'].LpFU()
.
运行测试,成功打印了 o[AUJ_(1156)]()
,raised from itrsa参数即可.
DWYi[ymDv(1137)](l)
Check out the meanings first,其中 l 是EbF_[ymDv(409)](e, h[ymDv(1194)])
,调用方法为DWYi['tc_t']
先看 l
Know it here aeskey It is analyzed from the first paragraph of our analysis o[AUJ_(1156)]()
extracted from the object.
此处的e actions are includedid、行为轨迹,and unknown parameters.
EbF_[ymDv(409)]
是对应的encrypt加密方法.Available locallyJOOO返回,JOOO在EbF_中.
那可以直接使用 EbF_.encrypt()
to call the encryption method.
即:EbF_.encrypt(e, h[ymDv(1194)])
本地调用,成功生成 l .
调用tc_t
有了l 之后,We are making upJS中直接调用DWYi.tc_t(l) 即可.
总体流程:
// 注册 _asekey_rsa
_asekey_rsa = LkEB['prototype'].LpFU()
rsa = _asekey_rsa.rsa
aeskey = _asekey_rsa.aeskey
// 生成 l
var l = EbF_.encrypt(e,aeskey)
// 加密后拼接
return DWYi.tc_t(l)+rsa
打印结果:
总结
The main content is process analysis and processing and calling of obfuscated code.
The content of the article is only the skin of the relatively well-informed detection,only analyzedPayload参数,In-depth detection and analysis is a long way to go.
The auxiliary code for this article is in the official account《Pythonlx》回复 shenzhi 领取.
边栏推荐
- 952. 按公因数计算最大组件大小 : 枚举质因数 + 并查集运用题
- About the data synchronization delay of MySQL master-slave replication
- CMake库搜索函数居然不搜索LD_LIBRARY_PATH
- 浅析显卡市场的未来走向:现在可以抄底了吗?
- 定时任务 corn
- MongoDB启动报错 Process: 29784 ExecStart=/usr/bin/mongod $OPTIONS (code=exited, status=14)
- MASM32v11编程调用Process32First失败: 程序发出命令,但命令长度不正确
- 面试何惧调优!腾讯技术官私藏的性能优化方案手册,原理实战齐全
- Excel使用Visual Basic Editor对宏进行修改
- SSE for Web Message Push
猜你喜欢
国内数字藏品的乱象与未来
瑞吉外卖项目实战Day02
CS内网横向移动 模拟渗透实操 超详细
What is the relationship between the construction of smart cities and 5G technology in the new era
Huawei issues another summoning order for "Genius Boys"!He, who had given up an annual salary of 3.6 million, also made his debut
The highest level of wiring in the computer room, the beauty is suffocating
自动化办公|办公软件和亿图脑图MindMaster快捷键
【回归预测-lssvm分类】基于最小二乘支持向量机lssvm实现数据分类代码
一文读懂网络效应对Web3的重要意义
This editor actually claims to be as fast as lightning!
随机推荐
v-model组件化编程应用
Smart Contract Security - Private Data Access
What is the relationship between the construction of smart cities and 5G technology in the new era
canal抓取数据
Flink real-time data warehouse completed
canal scrape data
[机缘参悟-53]:《素书》-3-修身养志[求人之志章第三]
CVE-2022-33891 Apache Spark 命令注入复现
编译、链接 - 笔记 - 3
GeoServer
How is the B+ tree index page size determined?
GeoServer + openlayers
MaxWell抓取数据
怎么判断两个字符串是否相等?
4位资深专家多年大厂经验分享出Flink技术内幕架构设计与实现原理
golang图片处理库image简介
MySQL客户端工具的使用与MySQL SQL语句
元宇宙邮局AI航天主题系列数字藏品 将于7月30日10:00点上线“元邮数藏”
71-page comprehensive overall solution for global tourism 2021 ppt
本地事务与分布式事务