Home >Web Front-end >JS Tutorial >Crawler JS reverse sliding encryption (2)
Relevant learning recommendations: javascript video tutorial
The previous article analyzed and restored the confusion of a certain slide. code, and many people in the background are asking about the encryption behind it and what the entire process is, so today I will simply come up with the entire encryption
Without further ado, time is precious, let’s get started!
Go back to the previous encryption of w
You can see that the function receives three parameters. Chase up the call stack
The restored code is very clear. The three parameters are c, l, n["$_DAAD"], look at the code carefully
_ = e ? n["lastPoint"]["x"] : t["$_CCAY"]() / a - n["$_DDHB"]u = e ? n["lastPoint"]["y"] : n["$_DDIm"] - t["$_CCBw"]() / a;复制代码
It is not difficult to guess that this _ and u correspond to the coordinates of the x and y axes respectively when we slide.
If you don’t believe it, you can take a ruler and measure it (manual dog head)
The third parameter is the sliding time. So the key lies in the second parameter l..
The console outputs it separately to see what it is
Do the last two look familiar? It is the data returned by the previous request
Then there is only one key point left, go in and take a look
Click in , you can enter the function, set a breakpoint, and resend the request
This t is a trajectory we slide..., through this function, the trajectory array becomes a string.
After deducting the function, the previous array assignment can be deleted, because we have restored it, and it seems to be in the way.
After deducting the function Try to run it, what is missing will be filled in. The principle that remains unchanged for thousands of years
continues to return to the encryption of l. Next is the outermost function. Use the same method to remove the encryption function.
After completing the above, the three parameters of the W encryption function are complete!
Continue with the following process.... It’s not difficult at all.
Just take out those encrypted functions.
Take out all those AES Base64 and that’s it!
Js The encryption part is basically completed, and all that remains is to send requests based on the request flow in the Network.
The above is the entire process of sliding a certain test, isn’t it so easy!
If you want to know more about programming learning, please pay attention to the php training column!
The above is the detailed content of Crawler JS reverse sliding encryption (2). For more information, please follow other related articles on the PHP Chinese website!