Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use Python encryption algorithm

2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article introduces the relevant knowledge of "how to use the Python encryption algorithm". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!

Polar X assistant

AHR0cHM6Ly93d3cuamlkYWlob21lLmNvbS9vZmZpY2VyLyMvbG9naW4=

Grab the bag first and see the parameters to be analyzed this time. [figure 1-1]

Figure 1-1

See that there is no encryption parameter name in [figure 1-1]. So in order to quickly locate the encrypted location, let's try the XHR breakpoint.

Switch to the console-Source tab and fill in the following as shown in [figure 1-2].

Figure 1-2

Then we make another request, and we can see that the breakpoint is on. [figure 1-3]

Figure 1-3

Let's click on the {} format JS in the lower left corner to see if the location on the breakpoint has what we need. [figure 1-4]

Figure 1-4

We can see here that the function y passes in a parameter tline t that contains the submission data we need [figure 1-5]. But you can't find the parameter encryption at this breakpoint, so we need to click on the stack on the right to look up.

Figure 1-5

We found this by looking at the stack information [figure 1-6]. It is found that there is a params-related operation here, so what may be included here is the encryption location we need, and we follow the prompt to go in and see what the encryption logic looks like here.

Figure 1-6

You can see that after passing in the processed password and user name, we do another encryption process and get the variable I.

Var r = t.randomKey (16), I = t.aesEncrypt (JSON.stringify (e), r)

Figure 1-7

Let's follow the parameters required by the variable I to take a look at the generation rules. [figure 1-8] is that the generation rule of the variable r is a random string.

Figure 1-8

Next is the encryption method of the encryption variable I [figure 1-9].

Figure 1-9

Then you just need to copy the methods of these parameters to the editor for further completion.

Tip: the parameter e here is the username and password we passed in, which is passed in lines 54-55 in [figure 1-6], and the password is encrypted by a layer of MD5.

Many friends here are obsessed with how to complete the I like i.enc.Utf8.parse here. In fact, the I here is our commonly used CryptoJS. As long as it is introduced, it can be replaced directly without withholding the entire JS.

This is the end of the content of "how to use Python encryption algorithm". Thank you for reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report