Disclaimer: This article is only for learning and communication, and it is prohibited to be used for illegal purposes, commercial activities, etc. Otherwise, do so at your own risk. If there is any infringement, please inform and delete, thank you! This tutorial is not written specifically for a certain website, purely technical research
Table of contents
case analysis
Target case: aHR0cHM6Ly9tb2JpbGUucGluZHVvZHVvLmNvbS8=
1. Corresponding interface
2. Difficulties
Parameter analysis
You can directly search for Dafa by the parameter name.
At present, you can see that there are many anti_contents. We can check a few more breakpoints. You
can see that this is his algorithm. You can use it by assigning a value to r.
Through analysis, you can know that it passed the above case. 0 in
the encryption, and then follow the breakpoint step by step several times, you will enter this
and continue to follow up step by step,
you can find that this is the location where the encryption is generated,
here is the encryption return
Then if you know the position, you can directly deduct it, and make up for what is missing.
Or it is a webpack, and you can directly deduct what is missing and make up for it.
Or you can fully deduct it from here and make some changes.
Later ,
it will be a little bit to make up the environment directly in this way. Not quite right, if you need to use it, you can explore it yourself! !
That's all for this issue! ! ! Bye-Bye! ! !