本帖最后由 QingYi. 于 2022-1-9 19:40 编辑
一如既往地先抓包
再抓一个,做对比
分析password,rkey和两个sig
拿着密码去跑一遍hook
发现是rsa加密,然后定位到这
有一个static静态代码块,首先加载它
查看d的引用
点进去就能发现猫腻
后面有一个init方法,点进去看看
就是在取网站上面的值
跑一遍就是这样
rsa rkey都到手了,差两个sig
sig1号是md5
果然没错
数据:
[Asm] 纯文本查看 复制代码 api_key=9e1874c67e0b42d79cc16f787b644339call_id=1632289321610client_info={"uniqid":"010045020561471","screen":"1080*1920","ext_info={station_id=32305}format=JSONgz=compressionisverify=1password=29e0051ce542e0cf0f7821e5073dbf86851e70ac7cc9c25336rkey=4c463262b412e695c8b01e5e03c48d5ftab_sequence=1uniq_id=010045020561471user=15612345678v=1.0verifycode=ad974a0756d84cec80fcea72fcbfba9f
分析:
[Asm] 纯文本查看 复制代码 api_key=9e1874c67e0b42d79cc16f787b644339call_id=1632289321610client_info={"uniqid":"010045020561471","screen":"1080*1920","ext_info={station_id=32305}format=JSONgz=compressionisverify=1password=29e0051ce542e0cf0f7821e5073dbf86851e70ac7cc9c25336rkey=4c463262b412e695c8b01e5e03c48d5ftab_sequence=1uniq_id=010045020561471user=15612345678v=1.0verifycode=ad974a0756d84cec80fcea72fcbfba9f
api_key:dead code
call_id:timestamp
client_info:can be random
password:
29e0051ce542e0cf0f7821e5073dbf86851e70ac7cc9c25336
the raw password:
29e0051ce542e0cf0f7821e5073dbf86851e70ac7cc9c25336c69614db9d8c23
截取代码就行
rkey:known
verifycode:dead code,抓两次包看它md5之前的值就知道了
sig2:
也是md5加密
data:
[Asm] 纯文本查看 复制代码 api_key=9e1874c67e0b42d79cc16f787b644339call_id=1632289321610client_info={"uniqid":"010045020561471","screen":"1080*1920","ext_info={station_id=32305}format=JSONgz=compressionisverify=1password=29e0051ce542e0cf0f7821e5073dbf86851e70ac7cc9c25336rkey=4c463262b412e695c8b01e5e03c48d5fsig=8354528e3f4f0266cff991937093f273tab_sequence=1uniq_id=010045020561471user=15612345678v=1.0verifycode=ad974a0756d84cec80fcea72fcbfba9f
带上了之前的值又加密一次
|