Himalaya (xm-sign) encryption cracking

This article mainly introduces the crawling of the data under the Himalaya account, obtaining likes, etc.

Link: https://www.ximalaya.com/zhubo/83885596/sound/

As shown below:

We can see that xm-sign is the key encryption parameter, and then we search for the specific location of the encryption parameter

xm-sign:48b2e5c704abb74a28636ca92e922ed6(54)1594363622163(94)1594363552947

Go in and look at the encryption method after you find it

 So far from the analysis, it is relatively simple for everyone to make the code.

 

Guess you like

Origin blog.csdn.net/zyc__python/article/details/107250909