19css加密css加密-雪碧图-数据干扰-md5-图片识别-css位置偏移-ob混淆-debuger

This commit is contained in:
luzhisheng 2023-03-24 10:55:12 +08:00
parent ac9ca2910d
commit 6173d9411b
14 changed files with 157 additions and 0 deletions

View File

@ -0,0 +1,7 @@
_0x32aef8['exSuS']($, '.odd')['text']('')['append'](datas);
var _0x20c24d = '.' + _0x124e6b(btoa(data['key'] + data['value'])['replace'](/=/g, ''));
// 'bzds2IWwijoIAmB0rxs8'

View File

@ -0,0 +1,70 @@
from parsel import Selector
import base64
import requests
import hashlib
import ddddocr
ocr = ddddocr.DdddOcr(beta=True)
def md5_value(key):
input_name = hashlib.md5()
input_name.update(key.encode("utf-8"))
sign = (input_name.hexdigest()).lower()
return sign
def challenge19(page):
url = "https://www.python-spider.com/api/challenge19"
payload = f"page={page}"
session = requests.session()
headers = {
'content-type': 'application/x-www-form-urlencoded; charset=UTF-8'
}
session.headers = headers
response = session.request("POST", url, headers=headers, data=payload)
return response.json()
def run():
data_num = 0
for page in range(1, 101):
response_json = challenge19(page)
print(response_json)
info = response_json.get('info')
key = response_json.get('key')
value = response_json.get('value')
encode_str = base64.encodebytes((key + value).encode('utf8'))
res_md5 = md5_value(str(encode_str, 'utf-8').replace('=', '').rstrip())
info_sel = Selector(info)
info_list = info_sel.xpath('//td[@class="info"]').extract()
for info in info_list:
info_sel = Selector(info)
img_list = info_sel.xpath('//img').extract()
num = 0
my_list = []
for img in img_list:
if res_md5 in img:
continue
img_sel = Selector(img)
style_num = int(img_sel.xpath('//img/@style').extract_first().replace('left:', '').replace('px', ''))
src = img_sel.xpath('//img/@src').extract_first().replace('data:image/png;base64,', '')
src_num = ocr.classification(src)
my_list.append({
'src': src_num,
'style': style_num + num,
})
num += 9
my_list = sorted(my_list, key=lambda e: e.__getitem__('style'))
res_num = ''
for item in my_list:
res_num += item.get('src')
print(f'页数{page}:{res_num}')
data_num += int(res_num)
print(data_num)
if __name__ == '__main__':
run()

View File

@ -0,0 +1,80 @@
# 知识点md5图片识别css位置偏移ob混淆debuger
## 解题思路
### 一、display: none解决思路
查看请求地址这里有2个`debuger`直接过掉
![请求](./img/6.png)
发现接口challenge19中info字段是一段html
![请求](./img/1.png)
分析内容,发现用数字图片的方式显示内容
![请求](./img/11.png)
<td class=\"info\">
<img src="xxxx" class="img_number 4a13ebc2e96b2381156dba12ff80cff7" style="left:-18px">
<img src="xxxx" class="img_number 752587204b02938c83c72e8417fe35b5" style="left:0px">
<img src="xxxx" class="img_number 752587204b02938c83c72e8417fe35b5" style="left:9px">
<img src="xxxx" class="img_number 752587204b02938c83c72e8417fe35b5" style="left:-9px">
<img src="xxxx" class="img_number 752587204b02938c83c72e8417fe35b5" style="left:0px">
<img src="xxxx" class="img_number 4a13ebc2e96b2381156dba12ff80cff7" style="left:9px">
</td>
查看审查元素在审查元素中的html增加了`display: none;`css样式但是这段代码不在接口challenge19返回结果中
![请求](./img/2.png)
html断点调试
![请求](./img/3.png)
进入断点可以找到这样一段js代码
![请求](./img/4.png)
其中的`datas`就是接口challenge19返回的html
![请求](./img/5.png)
利用控制台的打印改写js代码如下不难理解这就是jquery语法,将`datas`渲染到`class odd`
$('.odd')['text']('')['append'](datas);
仔细查看这时的变量`datas`还是没有添加`display: none;`内容
下面开始单步调试......单步调试....单步调试找到如下图这段js代码
![请求](./img/7.png)
简单翻译一下
var _0x20c24d = '.' + _0x124e6b(btoa(data['key'] + data['value'])['replace'](/=/g, ''));
发现`data['key'] + data['value']`就是接口challenge19返回的内容
![请求](./img/8.png)
`btoa`就是base64编码
`_0x124e6b`就是md5加密而且没有魔改过
![请求](./img/9.png)
返回的加密结果`4a13ebc2e96b2381156dba12ff80cff7`和html中`class="img_number`存在类似,这里就可以猜测如果`_0x124e6b`
加密后的值和`class="img_number`值相同那么该img标签是`display: none;`
### 二、css位置偏移
css位置偏移如下4张图片从上至下分别用`left=`+0+9+18+27得出的结果在把图片排序
![请求](./img/10.png)
### 三、图片识别
ocr = ddddocr.DdddOcr(beta=True)
src_num = ocr.classification(src)