4.极验滑块 跟W值3

This commit is contained in:
luzhisheng 2022-01-28 17:54:58 +08:00
parent c6b8092eb0
commit c40a5255a9
7 changed files with 78 additions and 1 deletions

BIN
img/28.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 43 KiB

BIN
img/29.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 62 KiB

BIN
img/30.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 54 KiB

BIN
img/31.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 50 KiB

BIN
img/32.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

BIN
img/33.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 37 KiB

View File

@ -219,4 +219,81 @@
r[$_BEGJJ(444)]($_BEGIH(33)) + $_BEGIH(407) + i[$_BEGIH(444)]($_BEGJJ(33)) + $_BEGIH(407) + o[$_BEGIH(444)]($_BEGIH(33)); r[$_BEGJJ(444)]($_BEGIH(33)) + $_BEGIH(407) + i[$_BEGIH(444)]($_BEGJJ(33)) + $_BEGIH(407) + o[$_BEGIH(444)]($_BEGIH(33));
} }
发现是平坦流,线开头结尾断点 最轨迹值的理解
![debugger](../img/28.png)
发现是平坦流线开头结尾断点发现这里面有一个t值非常像轨迹值
![debugger](../img/29.png)
打断点到最后一行,发现拼接好的轨迹
![debugger](../img/30.png)
r[$_BEGJJ(444)]($_BEGIH(33)) + $_BEGIH(407) + i[$_BEGIH(444)]($_BEGJJ(33)) + $_BEGIH(407) + o[$_BEGIH(444)]($_BEGIH(33));
进行字符串还原
r["join"]("") + "!!" + i["join"]("") + "!!" + o["join"]("");
这里就涉及到r, i, o,这里通过全局函数的方式调用js代码通过传入轨迹值生成加密数据
var t = function(t) {
var $_BEHDi = lTloj.$_CX
, $_BEHCK = ['$_BEHGM'].concat($_BEHDi)
, $_BEHEF = $_BEHCK[1];
$_BEHCK.shift();
var $_BEHFx = $_BEHCK[0];
for (var e, n, r, i = [], o = 0, s = 0, a = t[$_BEHEF(182)] - 1; s < a; s++)
e = Math[$_BEHEF(156)](t[s + 1][0] - t[s][0]),
n = Math[$_BEHDi(156)](t[s + 1][1] - t[s][1]),
r = Math[$_BEHDi(156)](t[s + 1][2] - t[s][2]),
0 == e && 0 == n && 0 == r || (0 == e && 0 == n ? o += r : (i[$_BEHEF(140)]([e, n, r + o]),
o = 0));
return 0 !== o && i[$_BEHDi(140)]([e, n, o]),
i;
}(this[$_BEGJJ(361)])
这个的 this[$_BEGJJ(361)] 就是轨迹数据,我通过传值的方式改造成
![debugger](../img/31.png)
js末尾进行全局函数引出
window.guiji = W[$_CJET(261)]["\u0024\u005f\u0047\u0045\u0079"];
代码调试
![debugger](../img/32.png)
同样轨迹代码也是一样炮制
l = n["$_CIBw"]["$_BBCA"](n["$_CIBw"]["$_GEy"](), n["$_CIY"]["c"], n["$_CIY"]["s"]);
window.guiji_2 = W[$_CJET(261)]["\u0024\u005f\u0042\u0042\u0043\u0041"];
![debugger](../img/33.png)
走到这里 aa 的值就得到了,接下来拿到 l 值
l = V[$_CAGEe(342)](gt[$_CAGEe(209)](o), r[$_CAGEe(742)]())
window.get_v = V["encrypt"];
最后一葫芦滑瓢w值得到
var u = r[$_CAGEe(750)]()
, l = V[$_CAGEe(342)](gt[$_CAGEe(209)](o), r[$_CAGEe(742)]())
, h = m[$_CAGEe(733)](l)
, f = {
"\u0067\u0074": i[$_CAGEe(147)],
"\u0063\u0068\u0061\u006c\u006c\u0065\u006e\u0067\u0065": i[$_CAGDp(154)],
"\u006c\u0061\u006e\u0067": o[$_CAGDp(119)],
"\u0024\u005f\u0042\u0042\u0046": r[$_CAGEe(623)],
"\u0063\u006c\u0069\u0065\u006e\u0074\u005f\u0074\u0079\u0070\u0065": r[$_CAGEe(648)],
"\u0077": h + u
};
注意点如果函数出现this那就要导出对象而不是导出方法。