夜幕-JS逆向系列课 第9课练习题使用符号对 Javascript 代码进行混淆

This commit is contained in:
luzhisheng 2022-08-08 16:45:41 +08:00
parent 72b1097dfc
commit ab949b7d63
7 changed files with 67 additions and 0 deletions

BIN
img/102.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 195 KiB

BIN
img/103.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 43 KiB

BIN
img/104.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 86 KiB

BIN
img/105.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

View File

@ -0,0 +1,39 @@
在JS逆向系列课的第9课《一击即中 处理常见代码混淆的方法》中我们见到了5中看起来很厉害的混淆字符串也学会了如何轻松干掉它们。
那么现在请运用你在第9课第3节中学到的知识尝试做一下这道题吧~
第2个帖子以1为起始的HTML中id为content的部分中一共有多少个br标签
![debugger](../img/104.png)
进入 `eval`
明文
![debugger](../img/105.png)
ba9f5e5d-7e71-4298-882c-57cd2ea1b4d8MTY3NjcxNDc5NzY=nightteam
密文
00fd56664d646e12758c991bdbaeacb50e3b1321
python 代码
"""
使用sha1加密算法返回str加密后的字符串
"""
def sha1_secret_str(s: str):
import hashlib
sha = hashlib.sha1(s.encode('utf-8'))
encrypts = sha.hexdigest()
return encrypts
if __name__ == '__main__':
# 待加密的字符串
s = 'ba9f5e5d-7e71-4298-882c-57cd2ea1b4d8MTY3NjcxNDc5NzY=nightteam'
res = sha1_secret_str(s)
print("预期结果:", "00fd56664d646e12758c991bdbaeacb50e3b1321")
print("实际结果:", res)

View File

@ -0,0 +1,18 @@
"""
使用sha1加密算法返回str加密后的字符串
"""
def sha1_secret_str(s: str):
import hashlib
sha = hashlib.sha1(s.encode('utf-8'))
encrypts = sha.hexdigest()
return encrypts
if __name__ == '__main__':
# 待加密的字符串
s = 'ba9f5e5d-7e71-4298-882c-57cd2ea1b4d8MTY3NjcxNDc5NzY=nightteam'
res = sha1_secret_str(s)
print("预期结果:", "00fd56664d646e12758c991bdbaeacb50e3b1321")
print("实际结果:", res)

View File

@ -147,4 +147,14 @@
![debugger](../img/101.png) ![debugger](../img/101.png)
遇到md5先不要去破解扣代码将明文放入 https://www.cmd5.com/hash.aspx?s=123456 加密一下
发现存在相同的密文
![debugger](../img/102.png)
在看看网站上密文
![debugger](../img/103.png)
问题得到解决!