1 Introduction
I haven’t seen a lot of this stuff, and I don’t understand many of the things in it. I spent half a day trying it out. Here I just briefly talk about the implementation method. The specific details need to be understood in depth. Did and iid are mainly installed for the first time
. Generated when app is used, the device information request returns did and iid.
2. Capture packets
After installing the app for the first time, open Charles to capture packets. According to online articles, the iid registration is in the service/2/device_register/ request. Let’s take a look at this request.
3.data decryption
The request is very simple, just a post request. The only difficulty is to encrypt the data form, which is the same as its verification code login principle. The specific process is to first convert it into a byte stream and then encrypt it with its own ttencrypt.
Here is some decrypted data
4.Results
Finally, there is the normal request to obtain the iid. This is just to register the device ID. It is said that it also requires activation and other operations, as well as log uploading, etc. I will learn more about it when I have time.