The application of sekiro in the field of js reverse engineering

1. A y website

Address: aHR0cHM6Ly93d3cuaWVzZG91eWluLmNvbS9zaGFyZS91c2VyLzgxNDE0MTYyODc2P3NlY191aWQ9TVM0d0xqQUJBQUFBa01DSU11enlDVkxjOXBOTFRUN2t281ZFRL0N2t281ZGl0n2t

2. How to locate encryption

Insert picture description here
Target address, the encryption parameter is signature

Start to locate the encrypted location
ctrl + shift + f to open the source panel, search for the encryption parameter_signature
Insert picture description here

3. Locate the encrypted location and start building the sekiro service

Refer https://github.com/virjar/sekiro/blob/master/README.md

3.1 Export the key encryption first, use the Overrides tool of chrome

First define the variables we want to call globally at the top, and then export them through variable assignment
Insert picture description here

Insert picture description here

3.2 Import the definition and related websoket functions needed by sekiro

Copy all the js code in this http://file.virjar.com/sekiro_web_client.js address to our encrypted js file to facilitate subsequent calls
Insert picture description here

3.3 Establish sekiro service

Write the code Insert picture description here
group and clientId can be configured by yourself
. Prompt after successful connection
Insert picture description here
View client information: https://sekiro.virjar.com/invoke?group=ws-group-test
Insert picture description here

4 Create encryption service

Insert picture description here

4.1 Start request

https://sekiro.virjar.com/invoke?group=ws-group-test&action=sign¶m=81414162876
Insert picture description here
data is the encryption parameter

5. Testing Service

Insert picture description here
Has a certain failure rate, the same as the client’s performance, the goal is achieved

Guess you like

Origin blog.csdn.net/esabeny/article/details/112625477