JS penetration crack Baidu translation

Yesterday chicken dishes into vscode configuration can not extricate themselves, but fortunately has been resolved, it is to be a complete penetration JS crack Baidu translation today

Note :( this article except for chicken dishes also use their own finishing a copy online you explain the power of God, any similarity, please leave a message chicken dishes, chicken dishes will be promptly corrected, thank you)

1. First, open the Developer Tools, go to the Network of XHR, and then in the translation box, enter the content to be translated, click on the translation, find the package v2transapi and post a request form post

 

 

2. Follow the steps in front of a re-translation of the other words, the same post to find its form

 

 

Post Comparison parameters can be found only query, sign change, query is what we need to find the words, so we can go through the final analysis we only need to know how to find the sign is encrypted, then we need to be able to reverse the decrypted content crawling to the

3. Open

Operating meal fierce as a tiger

 

 

 

4. We have analyzed the above steps have been we now need to use js code m (a) the output function, the code js buckle

 

 

5. vscode js code to run, and will find two errors, a i is not defined, n is a function not defined, we find a function of the value of i and n in the same manner, the resulting js code is Such:

 

 

 

 Note that, after modifications in vscode which should remember to save it, otherwise it will error runtime

The final print (r.json () [ 'dict_result'] [ 'simple_means'] [ 'word_means'] [0]) in order to remove the translation of the sentence

 

 

Guess you like

Origin www.cnblogs.com/zv123xc/p/12202896.html