current position:Home>DOM breakpoint of Python crawler reverse

DOM breakpoint of Python crawler reverse

2022-02-01 16:22:52 AJackpot

Website links

aHR0cDovL2dnenkuendmd2IudGouZ292LmNuLw==

Website analysis

The jump link displayed in the website source code is like this .

But take this link out and visit , The return is 403.

The real link is like this , And did not take any interface to encrypt .

So to find this encryption method , It needs to be used DOM Break point .

Because it's a click triggered event , So enter click This place in .

Then make a breakpoint in the suspicious position .

Finally, click the link to jump , If you find it, you can break to the encrypted location , Parameters and encryption , It will be clear at a glance .

Print the required... On the console ccc Parameters and s Parameters , give the result as follows .

qrcode_for_gh_68214466aa2d_258.jpg

Code implementation

Finally, after running the code , We can get what we want .

var CryptoJS = require("crypto-js");

function get_aes(ccc, s) {
  var srcs = CryptoJS.enc.Utf8.parse(ccc);
  var k = CryptoJS.enc.Utf8.parse(s);
  var en = CryptoJS.AES.encrypt(srcs, k, {
    mode: CryptoJS.mode.ECB,
    padding: CryptoJS.pad.Pkcs7
});
  var ddd = en.toString();
  return ddd
}

console.log(get_aes('974723', 'qnbyzzwmdgghmcnm'))
 Copy code 
Gtx8Sl/Xpf+B+97/Txl75w==
 Copy code 

Consistent result , end

Summary

The decryption difficulty of this article is entry level , It just takes skill at breakpoints .

copyright notice
author[AJackpot],Please bring the original link to reprint, thank you.
https://en.pythonmana.com/2022/02/202202011622500888.html

Random recommended