Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the method of encrypting Python password

2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article introduces the relevant knowledge of "what is the method of Python password encryption". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!

Analysis of X World password encryption

The victim of this time:

AHR0cHM6Ly9wYXNzcG9ydC5mYW5nLmNvbS8=

Analysis.

View the encrypted field by entering the wrong password to grab the package. [figure 1-1]

Figure 1-1

Directly by retrieving pwd: locate the encrypted location [figure 1-2].

Figure 1-2

Put a breakpoint on the corresponding location according to the retrieval results [figure 1-3], and copy the underlined code for backup.

Figure 1-3

Re-initiate the request and find that these parameters are similar to the following:

/ / password entered by that.password.val (): 11111111111

/ / encryptedString is an encryption method

EncryptedString (key_to_encode, that.password.val ())

According to the above analysis, one key_to_encode is missing, and a direct search can find the following results [figure 1-4]:

Figure 1-4

Obvious RSA encryption. At the same time, you will see the encryption logic of encryptedString. If you deduct it and assemble it, you will get the encryption logic [figure 1-5]:

Figure 1-5

Password encryption Analysis of XX second-hand Housing

The victim of this time:

AHR0cDovL2ouZXNmLmxlanUuY29tL3VjZW50ZXIvbG9naW4=

Analysis.

Also use the wrong password to test login [figure 2-1]

Figure 2-1

Here, the two parameters password and ckey are suspected to be encrypted, so let's search them first.

Ckey is the value passed in the hidden domain on the page [figure 2-2]

Figure 2-2

There are many search results of password, but the third file is more relevant from the file name. [figure 2-3]

Figure 2-3

Let's open the third file and format the search [figure 2-4].

Figure 2-4

Have you found that this encryption rule is very similar to the encryption of the above X world, and there is also the encryption logo of RSA, and publickey even the following encryptedString encryption methods are familiar [figure 2-5]? At the same time, refer to the example of X World [figure 1-3]

Figure 2-5

There is no suspense here, just use the code of an example to achieve encryption, and solve the case.

This is the end of the content of "what is the method of Python password encryption". Thank you for your reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report