Reverse analysis of Shumei slider verification code (simple environment version)

The reverse address of this issue is as follows, use base64 decoding to obtain
aHR0cHM6Ly93d3cuaXNodW1laS5jb20vdHJpYWwvY2FwdGNoYS5odG1s

In fact, the approach of this article is similar to that of another article: Reverse Analysis of the Fourth Generation Slider . If you don’t understand this article, you can also read this article.

This article will not go into details bit by bit from the beginning, but will only explain the general logic.

1. Find the encryption parameters

To find the encryption parameters, we must follow the stack slowly. Here, by following the stack, we find the following location.
Insert image description here
Here is where all the parameters are generated. Of course, some parameters are in the functions inside. Here you can see the final parameters. The _0x1fe1cf dictionary adds encrypted parameters one by one, such as mp, oc, etc., and all use the encryption function this['getEncryptContent']. Don't worry about the encryption function first. Let's first look at the origin of the generation of _0x298b01
Insert image description here
and follow up to find out. All the parameters are generated here, and they are all generated by this['getEncryptContent'], so this is the key encryption function. The value and secret key passed by each parameter will not be analyzed here. The values ​​​​have fixed values ​​and biased values. Value transfer, the secret key is fixed, you can deduct it slowly by yourself, the focus is on this encryption function

2. Export encryption function

First put the entire js code locally, and then add the window and other corresponding environments. The environment is roughly as follows
Insert image description here

The next step is to export the encryption function, which is similar to the logic exported in the Jiexian 4th generation article. Just assign it to the window.
Insert image description here

3. Encapsulation of encryption functions

Now there is an encryption function, and the encapsulation is very simple. Just deduct the value and then generate the trajectory of the slider. Not much to say, just look at the code.
Insert image description here

4. Send verification request

Then, use python to call the function to send the request. It should be noted here that the background image obtained is 600, and the web page is 300, so the final distance must be divided by 2 to
Insert image description here
successfully obtain the pass response result.
Insert image description here

Guess you like

Origin blog.csdn.net/qq_36551453/article/details/135273883