当前位置:网站首页>Extremely Knowing v2 Analysis
Extremely Knowing v2 Analysis
2022-07-30 15:32:00 【Archaeologist lx (Li Xi)】
案例地址:geetest.com/Register
案例内容:Analyzing the detection when logging inV2提交的Request Payload信息.
The content of the article is only for learning reference,如有侵权请联系作者进行删除

接口分析
POST请求
加密Payload:
参数定位
长话短说,通过XHR断点.

往回走5You can see where the parameters are generated.

According to the debug information and the value in the interface comparison,发现e = DWYi[ymDv(1137)](l)是payload的其中一部分.
继续调试,发现代码:e + h[AUJ_(1173)]
Combining debugging information to draw conclusions:payload = DWYi[ymDv(1137)](l) + h[AUJ_(1173)]
h[AUJ_(1173)]
经测试,h是动态的,其中的aeskey和rsa的值不固定.
再次分析源码,可知 h = o[AUJ_(1156)]()
继续调试,AUJ_(1156) = ‘LpFU’
双击点进去,找到对应的方法.
Put the contents of this file in Lxtools Dissolve the confusion,Variable names are restored.
The overall code structure after copying to local formatting is as follows:
Discovery is a self-executing method,After manual processing, it can be changed to the following:

Then make up the environment according to the error,Such as these appear
Run it again after finishing,会返回MlHc. Then modify the code,让其返回 LkEB['prototype'].LpFU().
运行测试,成功打印了 o[AUJ_(1156)](),raised from itrsa参数即可.
DWYi[ymDv(1137)](l)
Check out the meanings first,其中 l 是EbF_[ymDv(409)](e, h[ymDv(1194)]),调用方法为DWYi['tc_t']
先看 l
Know it here aeskey It is analyzed from the first paragraph of our analysis o[AUJ_(1156)]() extracted from the object.
此处的e actions are includedid、行为轨迹,and unknown parameters.
EbF_[ymDv(409)]是对应的encrypt加密方法.Available locallyJOOO返回,JOOO在EbF_中.
那可以直接使用 EbF_.encrypt()to call the encryption method.
即:EbF_.encrypt(e, h[ymDv(1194)])

本地调用,成功生成 l .
调用tc_t
有了l 之后,We are making upJS中直接调用DWYi.tc_t(l) 即可.
总体流程:
// 注册 _asekey_rsa
_asekey_rsa = LkEB['prototype'].LpFU()
rsa = _asekey_rsa.rsa
aeskey = _asekey_rsa.aeskey
// 生成 l
var l = EbF_.encrypt(e,aeskey)
// 加密后拼接
return DWYi.tc_t(l)+rsa
打印结果:
总结
The main content is process analysis and processing and calling of obfuscated code.
The content of the article is only the skin of the relatively well-informed detection,only analyzedPayload参数,In-depth detection and analysis is a long way to go.
The auxiliary code for this article is in the official account《Pythonlx》回复 shenzhi 领取.

边栏推荐
- 【元胞自动机】基于元胞自动机模拟生命演化、病毒感染等实例附matlab代码
- ESP32 Repeated Reboot Issue Arduino Shield Power Outage Detector
- 那些破釜沉舟入局Web3.0的互联网精英都怎么样了?
- 异常情况处置方案
- 使用bat脚本以json格式导出mongo数据库中指定表数据
- MongoDB启动报错 Process: 29784 ExecStart=/usr/bin/mongod $OPTIONS (code=exited, status=14)
- 惊艳!京东T8纯手码的Redis核心原理手册,基础与源码齐下
- Use of SLF4J
- Lock wait timeout exceeded解决方案
- ISELED---氛围灯方案的新选择
猜你喜欢

Meta首份元宇宙白皮书9大看点,瞄准80万亿美元市场

Smart Contract Security - Private Data Access

PyQt5快速开发与实战 9.1 使用PyInstaller打包项目生成exe文件

【回归预测-lssvm分类】基于最小二乘支持向量机lssvm实现数据分类代码

【元胞自动机】基于元胞自动机模拟生命演化、病毒感染等实例附matlab代码

使用 protobuf 进行数据序列化

那些破釜沉舟入局Web3.0的互联网精英都怎么样了?

CS内网横向移动 模拟渗透实操 超详细

GeoServer + openlayers

自动化办公|办公软件和亿图脑图MindMaster快捷键
随机推荐
泡沫褪去,DeFi还剩下什么
基于FPGA的DDS任意波形输出
那些破釜沉舟入局Web3.0的互联网精英都怎么样了?
Meta首份元宇宙白皮书9大看点,瞄准80万亿美元市场
postgresql的普通字符串和转义字符串
第十一章 api mgmnt API 参考
What is the relationship between the construction of smart cities and 5G technology in the new era
极验深知v2分析
GeoServer
(科普文)什么是碎片化NFT(Fractional NFT)
元宇宙的前景及四大赛道
《二舅》刷屏了!
Installing and Uninstalling MySQL on Mac
CVE-2022-33891 Apache Spark 命令注入复现
去腾讯面试,直接让人出门左拐 :幂等性都不知道!
ISELED---氛围灯方案的新选择
Lock wait timeout exceeded solution
瑞吉外卖项目实战Day02
Could not acquire management access for administration
算力顶天地,存力纳乾坤:国家超级计算济南中心的一体两面