mirror of
https://github.com/luzhisheng/js_reverse.git
synced 2025-04-20 21:55:07 +08:00
夜幕-第9课练习题使用代码压缩技术对Javascript 代码进行混淆
This commit is contained in:
parent
074d673179
commit
ea6bb13354
@ -1 +1 @@
|
||||
Subproject commit 1a5f1a4e6a76ad3f7627559d0a04af26d439fef1
|
||||
Subproject commit 7b87ef1983413bf7b3ab922efa6e6a3495f85f89
|
BIN
img/111.png
Normal file
BIN
img/111.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 64 KiB |
BIN
img/112.png
Normal file
BIN
img/112.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 112 KiB |
BIN
img/113.png
Normal file
BIN
img/113.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 41 KiB |
16
夜幕-第9课练习题使用代码压缩技术对Javascript 代码进行混淆/key测试.js
Normal file
16
夜幕-第9课练习题使用代码压缩技术对Javascript 代码进行混淆/key测试.js
Normal file
@ -0,0 +1,16 @@
|
||||
function uuid() {
|
||||
var s = [];
|
||||
var hexDigits = "0123456789abcdefghijklmnopqrstuvwxyz";
|
||||
for (var i = 0; i < 36; i++) {
|
||||
s[i] = hexDigits.substr(Math.floor(Math.random() * 0x10), 1);
|
||||
}
|
||||
s[14] = "4";
|
||||
s[19] = hexDigits.substr((s[19] & 0x3) | 0x8, 1);
|
||||
s[8] = s[13] = s[18] = s[23] = "-";
|
||||
var uuid = s.join("");
|
||||
return uuid;
|
||||
}
|
||||
|
||||
uuid_res = uuid();
|
||||
|
||||
console.log(uuid_res);
|
55
夜幕-第9课练习题使用代码压缩技术对Javascript 代码进行混淆/readme1.md
Normal file
55
夜幕-第9课练习题使用代码压缩技术对Javascript 代码进行混淆/readme1.md
Normal file
@ -0,0 +1,55 @@
|
||||
在JS逆向系列课的第9课《一击即中 处理常见代码混淆的方法》中,我们见到了5中看起来很厉害的混淆字符串,也学会了如何轻松干掉它们。 那么现在,请运用你在第9课第5节中学到的知识,尝试做一下这道题吧~
|
||||
|
||||
请问:
|
||||
|
||||
这一页帖子的平均阅读量(列表页右侧的数字)是多少?(需整除)
|
||||
|
||||
找到加密的地方打断点
|
||||
|
||||

|
||||
|
||||
发现加密地方
|
||||
|
||||
md5(key + base64.encode(time) + 'xianyucoder11')
|
||||
|
||||
key = "9247afed8bea110ae75461a9b54b2eeaff2b73cf"
|
||||
|
||||
base64.encode(time) 中的 time = "16786173524",测试发现base64没有魔改
|
||||
|
||||
key 是如何得到的
|
||||
|
||||
let key = uuid();
|
||||
|
||||
开始扣js代码
|
||||
|
||||
function uuid() {
|
||||
var s = [];
|
||||
var hexDigits = "0123456789abcdefghijklmnopqrstuvwxyz";
|
||||
for (var i = 0; i < 36; i++) {
|
||||
s[i] = hexDigits.substr(Math.floor(Math.random() * 0x10), 1);
|
||||
}
|
||||
s[14] = "4";
|
||||
s[19] = hexDigits.substr((s[19] & 0x3) | 0x8, 1);
|
||||
s[8] = s[13] = s[18] = s[23] = "-";
|
||||
var uuid = s.join("");
|
||||
return uuid;
|
||||
}
|
||||
|
||||
本地运行,可以直接运行
|
||||
|
||||
function uuid() {
|
||||
var s = [];
|
||||
var hexDigits = "0123456789abcdefghijklmnopqrstuvwxyz";
|
||||
for (var i = 0; i < 36; i++) {
|
||||
s[i] = hexDigits.substr(Math.floor(Math.random() * 0x10), 1);
|
||||
}
|
||||
s[14] = "4";
|
||||
s[19] = hexDigits.substr((s[19] & 0x3) | 0x8, 1);
|
||||
s[8] = s[13] = s[18] = s[23] = "-";
|
||||
var uuid = s.join("");
|
||||
return uuid;
|
||||
}
|
||||
|
||||
uuid_res = uuid();
|
||||
|
||||
console.log(uuid_res);
|
Loading…
x
Reference in New Issue
Block a user