mirror of
https://github.com/luzhisheng/js_reverse.git
synced 2025-04-17 16:37:09 +08:00
调试websocket
This commit is contained in:
parent
4a96831b17
commit
5bb96e053c
BIN
img/44.png
Normal file
BIN
img/44.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 58 KiB |
BIN
img/45.png
Normal file
BIN
img/45.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 36 KiB |
BIN
img/46.png
Normal file
BIN
img/46.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 199 KiB |
77653
zy-websocket/案例.js
Normal file
77653
zy-websocket/案例.js
Normal file
File diff suppressed because one or more lines are too long
@ -37,8 +37,29 @@ hook
|
||||
|
||||
发送弹暮测试,定位到加密函数
|
||||
|
||||
w && m.connected && w.send(t)
|
||||
|
||||
这里的 && 如果 w为true, m.connected为true,w.send(t)为true。执行w.send(t)
|
||||
|
||||

|
||||
|
||||
这里可以看到t是发送的二进制的数据
|
||||
|
||||

|
||||
|
||||
r 值序列化数据
|
||||
|
||||
a = JSON.stringify(r)
|
||||
b = JSON.parse(a)
|
||||
|
||||

|
||||
|
||||
r中间存在我发送的代码内容,打上断点
|
||||
|
||||
d.writeStruct("tReq", r)
|
||||
|
||||
这里能发现 d 存在方法做加密,d是由 var d = new l.Wup; 得到的,那么现在需要搞定 l 值。
|
||||
|
||||

|
||||
|
||||
l 值是 h.Taf 得到的, h 值是 t.taf 得到的,那买t值?t值是传入的
|
Loading…
x
Reference in New Issue
Block a user