zl程序教程

您现在的位置是:首页 >  APP

当前栏目

某江app算法分析

2023-03-14 22:42:19 时间

一、抓包分析

1、数据包

GET  http://m.api.zt.jsw.com.cn/v2/member?password=a123456&clientid=1&device_id=010067028741939&ip=1.1.1.1&system_name=android&sign=e96e177e2b9ed89680ac754916333527&siteid=10001&time=1630198142862&type=android&account=15836353612&modules=cloudlogin%3A1 HTTP/1.1
Content-Length: 0
Host: m.api.zt.jsw.com.cn
Connection: Keep-Alive
Accept-Encoding: gzip

2、分析参数,只有sign是密文

0a2653c851af460fa595bd959398a8f1.png

二、将app拖进jeb分析

1、搜索关键词"sign"

0eacb84100b54626af849e6b562bf92a.png

2、tab键转换成java代码,需要查看b.a方法

public RequestParams a(RequestParams params, Context context) {
        params.put("device_id", PhoneInfoUtils.getDeviceId(context));
        params.put("clientid", "1");
        params.put("ip", AppUtil.getLocalIP());
        long timestamp = System.currentTimeMillis();
        params.put("siteid", "10001");
        params.put("system_name", "android");
        params.put("type", "android");
        params.put("sign", b.a(params.getURLHashMap(), timestamp + ""));
        params.put("time", timestamp + "");
        return params;
    }

3、双击进入b.a方法,倒着看,v4是最终结果,v9_2是第一次md5,v6是第二次md5,v9_1是md5的参数

public static String a(HashMap arg14, String time) {
        LinkedHashMap sortParams = new LinkedHashMap();
        Object[] key_arr = arg14.keySet().toArray();
        Arrays.sort(key_arr);
        int v10;
        for(v10 = 0; v10 < key_arr.length; v10 = (((int)v9)) + 1) {
            Object key = key_arr[v10];
            try {
                String v12 = key.toString();
                String v9 = URLEncoder.encode(((String)arg14.get(key)).toString(), "UTF-8");
                sortParams.put(v12, v9);
            }
            catch(UnsupportedEncodingException e) {
                e.printStackTrace();
            }
        }
        StringBuilder result = new StringBuilder();
        for(Object v1: sortParams.entrySet()) {
            Map.Entry entry = (Map.Entry)v1;
            if(result.length() > 0) {
                result.append("&");
            }
            result.append(((String)entry.getKey()));
            result.append("=");
            result.append(((String)entry.getValue()));
        }
        String v9_1 = result.toString().replace("*", "%2A").replace("%7E", "~").replace("+",  "%20");
        crack.log(v9_1);
        String v6 = MD5.md5(v9_1);
        crack.log(v6);
        String v9_2 = v6 + "1fa50ba25ed527f3fd1eb9467686f2bb" + time;
        crack.log(v9_2);
        String v4 = MD5.md5(v9_2);
        crack.log(v4);
        return v4;
    }

4、在上面三处处下断

2d65d23f6d4748949b924e4057485923.png

5、动态调试,触发断点

v9=account=15836353612&clientid=1&device_id=010067028741939&ip=1.1.1.1&modules=cloudlogin%3A1&password=a123456789&siteid=10001&system_name=android&type=android

2e9b90b2ca334476abebe75bafe6eeaa.png

V6=585179fa211c64189ef1cfb45b8b5e52

6、v6是v9的md5值

4cebaac233b3433da32a72337a77fc60.png

7、第二个

v9=2db65aefd5f993ee290b7b709edc8f46+1fa50ba25ed527f3fd1eb9467686f2bb+1630223825602,再进行一次md5加密,记得去了+,这里只是让大家看清楚

4cebaac233b3433da32a72337a77fc60.png

禁止非法,后果自负