Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use the Oil Monkey plug-in in JS

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

In this issue, the editor will bring you about how to use the oil monkey plug-in in JS. The article is rich in content and analyzes and narrates it from a professional point of view. I hope you can get something after reading this article.

I have tried to use the script Hook before, but there is no Hook, because the posture is not right, after using the method he taught, it is easy to find a place to generate. Use oil monkeys to protect your hair.

The script is as follows:

/ / = = UserScript==// @ name Hook global// @ namespace http://tampermonkey.net/// @ version 0.1 include / @ description try to take over the Worldwide Universe / @ author owner of the Yue Lai Inn / / @ include * / / @ grant none// @ run-at document-start// = = / UserScript==

(function () {'use strict'; / / Global variable monitoring var t = window._t Object.defineProperty (window,' _ tasking, {get: function () {console.log ('Getting window._t'); return t;}, set: function (val) {console.log (' Setting window._t', val)) Debugger; t = val; return t;})}) ()

After adding the script, try the effect.

Open a new tab, press F12 and enter in the address bar:

Https://passport.yhd.com/passport/login_input.do

Then, enter, at this time, stopped:

See, very easy to live in Hook, a hair is not lost, all right (their own boredom does not count ha).

Let's look at the stack, click the next line (nQ), and beautify the code, as shown in the figure:

Print these variables on the console:

It's split and reverse again. No wonder you couldn't find it yesterday. Look at the following line of code:

Lm [nV] = nR

This lm is the window object, the value of nV is "_ t", and nR is the value. Sure enough, it is passed here. We see that nR is passed in. We continue to follow the stack up and come here:

It turns out that this function is called. The value of b ('0x2fdflowers,' ad) B') is call under the console. You can see that nM is the value passed in, and then see where the nM is assigned:

In this case'2', nM is the first to be assigned, that is, the encrypted location we found.

This is how to use the oil monkey plug-in in JS shared by the editor. If you happen to have similar doubts, please refer to the above analysis to understand. If you want to know more about it, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report