In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article introduces the relevant knowledge of "how to achieve Wechat picture encryption and decryption". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!
Today, we mainly discuss the encryption and decryption of Wechat pictures. We all know that the pictures received by Wechat are encrypted and need to be decrypted, but this encryption is known to be XOR. But how to XOR, with whom XOR? This time is around this, we manually calculate the value of XOR, in order to thoroughly understand what is the principle, the following demonstration of the effect. If you normally change the encrypted image suffix at the end of dat to the end of jpg, and then open it is a mistake, it is not possible. Now let's OD load Wechat, make a breakpoint in the receiving message call, then send a picture from other Wechat, and then see the xml message of the received picture.
Then copy the address to the CE tool, and then copy the value value into the text to see
Then find the name of the picture in OD and copy it. Then we use a tool, hexview opens both unencrypted and encrypted ones, their size and number of bytes are exactly the same, but the bytes inside are encrypted, the two are completely different, because we know that he is XOR encrypted, so it is easier to crack, as long as there is an original and an encrypted one, it can be calculated with the following XOR formula, for example: the first one above is FF. That is: 11111111 corresponds to A3, that is, 01011100, and then the two XOR is 10100011, that is, decrypting it with 5C XOR, and then verifying it with other ones. At present, most of the functions have been achieved, and the operation is stable, such as sending all kinds of messages, receiving all kinds of messages, group management, downloading files, adding friends, detecting zombie powder and so on, which can provide interfaces to facilitate secondary development and welcome technical exchanges.
"how to achieve Wechat picture encryption and decryption" content is introduced here, thank you for reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.