Parameter anti_content reverse learning

Disclaimer: This article is only for learning and communication, and it is prohibited to be used for illegal purposes, commercial activities, etc. Otherwise, do so at your own risk. If there is any infringement, please inform and delete, thank you! This tutorial is not written specifically for a certain website, purely technical research

case analysis

Target case: aHR0cHM6Ly9tb2JpbGUucGluZHVvZHVvLmNvbS8=

1. Corresponding interface
insert image description here
2. Difficulties
insert image description here

Parameter analysis

You can directly search for Dafa by the parameter name.
insert image description here
At present, you can see that there are many anti_contents. We can check a few more breakpoints. You
insert image description here
can see that this is his algorithm. You can use it by assigning a value to r.
insert image description here
Through analysis, you can know that it passed the above case. 0 in
insert image description here
the encryption, and then follow the breakpoint step by step several times, you will enter this
insert image description here
and continue to follow up step by step,
insert image description here
you can find that this is the location where the encryption is generated,
insert image description here
here is the encryption return

insert image description here
Then if you know the position, you can directly deduct it, and make up for what is missing.
Or it is a webpack, and you can directly deduct what is missing and make up for it.
Or you can fully deduct it from here and make some changes.
insert image description here
Later ,
insert image description here
it will be a little bit to make up the environment directly in this way. Not quite right, if you need to use it, you can explore it yourself! !
That's all for this issue! ! ! Bye-Bye! ! !
insert image description here

Show results

insert image description here

Guess you like

Origin blog.csdn.net/w62181310/article/details/130944581