爬 app 的内容, 抓出接口的都是这些东西,
ADJD6RWCxaKzOX_DU5ksE2CnAr8n60kzOeTsEX8n60hOxDEITzfzcyrX6hWSA2kzOeEfovJ0Z5PC6qEI5lszL5KzOe-4TNkPWeQCovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1oYO1jb5I6B9IoBa1S0u11b-ppD816vsIGB41x2i16yG1LqLmmvvEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDT9jPTNjPTDEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5Mk9MvEsEXWexlJuEej4oeQfovJCc0hDR01nx5kzOzEPONTbGzjbTeQfWvJgoaszL5KzOe-4TNkPWMklovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514EejzIoBZ1ozWI6q6ppDT1xvP1Szw1SDJ1x2i16yG165GEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDT9jfWejCTvEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MkPEzfzc0Wwc2kzOeTYTNQsEXh96RJ3x2rF6qEIEe-mTzjbGzjmON-PEX4sADJS6vEITMKfWM-fTN-sE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouYxiuHZVuSGVuSJVwwE9XXJiXdIxHYVjzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOeTlOeKmEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWHKzovJ9Z0gD6qEITzmfTvfzURWucugYZ5CuEejz_zjb1mzPEX4sADJS6vEITMKfWMQlTNEsE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouYxiuHZVuSGVuSJVwwE9uwjeXdIxHYVjzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOeECOeEDEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWDEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPT9TbGzjbWMECWqJgoaszL5KzOe-4TNkfWMKDovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz11D3GzVX2jMHYEluSxlXebXwwEfzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOe-1OeE9EzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeksE2Cw6yhsEejzU2u0xD8ZWu8sURTd_vEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPWMQbGzjbWekmOqJgoaszL5KzOe-4TNkfTe-DovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1ozW1L5g1mISmmvvEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDTejfWNj4TzEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MZ0LqEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPT9dbGzjbWeKPWvJgoaszL5KzOe-4TNkfTMKDovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1pY61L5g1LqL1ozcIG5i1j2M1x2i16yGEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDTejfTMjPWqEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MdCEzfzc0Wwc2kzOe-YTNQsEXh96RJ3x2rF6qEIEe-9OvjbGzjDWNTCEX4sADJS6vEITMKfWNHfT9ksE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouSbRuSbRuSxljVmKzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEPOeQPOeQlEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWC8sURTzovJ9Z0gD6qEIWqmfTvfzURWucugYZ5CuEejzTMdDGzjbGeHPWNcz3qPpE2uHEejPWNQ4ONHfWqfzZR8fq5KzOeEPOMkfTe-sE2rfca6ucXWSx0mzOzEPoe-
1
rocketman13 2018-07-05 14:47:07 +08:00
一个接口有这么长?
|
2
yellowmarlboro OP @rocketman13
哦 不 接口抓下来的内容是这些 |
3
DsuineGP 2018-07-05 14:52:24 +08:00
安卓的 app 反编译一下,拿到密钥解密就是了
|
4
glacer 2018-07-05 14:55:52 +08:00
页端的话要么追踪调试 js 摸清解密方式,要么用浏览器抓取。
APP 的话要么反编译获取解密函数,要么用模拟点击的形式实现。 |
5
yellowmarlboro OP @glacer
APP 的话 模拟点击? 用 appnium 还是什么? |
6
yellowmarlboro OP |
7
SorcererXW 2018-07-05 16:32:10 +08:00
就算是反编译也不一定看得出,有可能是在本地用 NDK 处理加解密的
|
8
ccc008 2018-07-05 16:34:49 +08:00 via iPhone
@yellowmarlboro 只能一点一点分析了,没有捷径
|
9
dengtongcai 2018-07-05 19:18:46 +08:00 via Android
@DsuineGP 对头
|
10
crawl3r 2018-07-05 19:23:00 +08:00
一年就是加密后的数据,你需要逆向找到解密算法和密钥
|