Home  >  Article  >  Web Front-end  >  Crawler JS reverse sliding encryption (2)

Crawler JS reverse sliding encryption (2)

coldplay.xixi
coldplay.xixiforward
2020-09-12 17:52:083834browse

Crawler JS reverse sliding encryption (2)

Relevant learning recommendations: javascript video tutorial

The previous article analyzed and restored the confusion of a certain slide. code, and many people in the background are asking about the encryption behind it and what the entire process is, so today I will simply come up with the entire encryption

Without further ado, time is precious, let’s get started!

Go back to the previous encryption of w

Crawler JS reverse sliding encryption (2)

You can see that the function receives three parameters. Chase up the call stack

Crawler JS reverse sliding encryption (2)

The restored code is very clear. The three parameters are c, l, n["$_DAAD"], look at the code carefully

 _ = e ? n["lastPoint"]["x"] : t["$_CCAY"]() / a - n["$_DDHB"]u = e ? n["lastPoint"]["y"] : n["$_DDIm"] - t["$_CCBw"]() / a;复制代码

It is not difficult to guess that this _ and u correspond to the coordinates of the x and y axes respectively when we slide.

If you don’t believe it, you can take a ruler and measure it (manual dog head)

Crawler JS reverse sliding encryption (2)

The third parameter is the sliding time. So the key lies in the second parameter l..

The console outputs it separately to see what it is

Do the last two look familiar? It is the data returned by the previous request

Crawler JS reverse sliding encryption (2)

Then there is only one key point left, go in and take a look

Crawler JS reverse sliding encryption (2)

Click in , you can enter the function, set a breakpoint, and resend the request

Crawler JS reverse sliding encryption (2)

This t is a trajectory we slide..., through this function, the trajectory array becomes a string.

After deducting the function, the previous array assignment can be deleted, because we have restored it, and it seems to be in the way.

Crawler JS reverse sliding encryption (2)

After deducting the function Try to run it, what is missing will be filled in. The principle that remains unchanged for thousands of years

continues to return to the encryption of l. Next is the outermost function. Use the same method to remove the encryption function.

Crawler JS reverse sliding encryption (2)

After completing the above, the three parameters of the W encryption function are complete!

Continue with the following process.... It’s not difficult at all.

Just take out those encrypted functions.

Crawler JS reverse sliding encryption (2)

Take out all those AES Base64 and that’s it!

Js The encryption part is basically completed, and all that remains is to send requests based on the request flow in the Network.

The above is the entire process of sliding a certain test, isn’t it so easy!

If you want to know more about programming learning, please pay attention to the php training column!

The above is the detailed content of Crawler JS reverse sliding encryption (2). For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:juejin.im. If there is any infringement, please contact admin@php.cn delete