-
使用fiddler抓包
-
- 分析请求头
加密参数X-Auth-1
- 分析请求头
-
反编译apk分析
-
-
hook代码
Hook代码如下:import frida, sys def on_message(message, data): if message['type'] == 'send': print("[*] {0}".format(message['payload'])) else: print(message) js_code = ''' Java.perform(function(){ var hook_Activity = Java.use('jianshu.foundation.util.q'); hook_Activity.a.overload("java.lang.String").imple mentation = function(arg1){ var return1 = this.a(arg1); send("arg1:"+ arg1); send("result:" + return1) return return1; } }); ''' session = frida.get_usb_device().attach("com.jianshu.haruki") script = session.create_script(js_code) script.on('message', on_message) script.load() sys.stdin.read()
-
-
hook结果如下:
[]arg1:9824358b306201c9baf887aaa6155f72
1556515792
[] result:cb74ed18e0f44b3cbec5182b1196df65
[]arg1:9824358b306201c9baf887aaa6155f72
1556515793
[] result:40751f39d759c06e2cd0c902a180cd2a
后十位为时间戳,前面为密钥,两个相连接直接MD5
分析完毕,喜欢的点小红心,歇歇!!
喜欢爬虫的关注个人公众号:python撸码