current position:Home>DOM breakpoint of Python crawler reverse

DOM breakpoint of Python crawler reverse

2022-02-01 16:22:52 AJackpot

Website links


Website analysis

The jump link displayed in the website source code is like this .

But take this link out and visit , The return is 403.

The real link is like this , And did not take any interface to encrypt .

So to find this encryption method , It needs to be used DOM Break point .

Because it's a click triggered event , So enter click This place in .

Then make a breakpoint in the suspicious position .

Finally, click the link to jump , If you find it, you can break to the encrypted location , Parameters and encryption , It will be clear at a glance .

Print the required... On the console ccc Parameters and s Parameters , give the result as follows .


Code implementation

Finally, after running the code , We can get what we want .

var CryptoJS = require("crypto-js");

function get_aes(ccc, s) {
  var srcs = CryptoJS.enc.Utf8.parse(ccc);
  var k = CryptoJS.enc.Utf8.parse(s);
  var en = CryptoJS.AES.encrypt(srcs, k, {
    mode: CryptoJS.mode.ECB,
    padding: CryptoJS.pad.Pkcs7
  var ddd = en.toString();
  return ddd

console.log(get_aes('974723', 'qnbyzzwmdgghmcnm'))
 Copy code 
 Copy code 

Consistent result , end


The decryption difficulty of this article is entry level , It just takes skill at breakpoints .

copyright notice
author[AJackpot],Please bring the original link to reprint, thank you.

Random recommended