In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article introduces the relevant knowledge of "what is the method of Python password encryption". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!
Analysis of X World password encryption
The victim of this time:
AHR0cHM6Ly9wYXNzcG9ydC5mYW5nLmNvbS8=
Analysis.
View the encrypted field by entering the wrong password to grab the package. [figure 1-1]
Figure 1-1
Directly by retrieving pwd: locate the encrypted location [figure 1-2].
Figure 1-2
Put a breakpoint on the corresponding location according to the retrieval results [figure 1-3], and copy the underlined code for backup.
Figure 1-3
Re-initiate the request and find that these parameters are similar to the following:
/ / password entered by that.password.val (): 11111111111
/ / encryptedString is an encryption method
EncryptedString (key_to_encode, that.password.val ())
According to the above analysis, one key_to_encode is missing, and a direct search can find the following results [figure 1-4]:
Figure 1-4
Obvious RSA encryption. At the same time, you will see the encryption logic of encryptedString. If you deduct it and assemble it, you will get the encryption logic [figure 1-5]:
Figure 1-5
Password encryption Analysis of XX second-hand Housing
The victim of this time:
AHR0cDovL2ouZXNmLmxlanUuY29tL3VjZW50ZXIvbG9naW4=
Analysis.
Also use the wrong password to test login [figure 2-1]
Figure 2-1
Here, the two parameters password and ckey are suspected to be encrypted, so let's search them first.
Ckey is the value passed in the hidden domain on the page [figure 2-2]
Figure 2-2
There are many search results of password, but the third file is more relevant from the file name. [figure 2-3]
Figure 2-3
Let's open the third file and format the search [figure 2-4].
Figure 2-4
Have you found that this encryption rule is very similar to the encryption of the above X world, and there is also the encryption logo of RSA, and publickey even the following encryptedString encryption methods are familiar [figure 2-5]? At the same time, refer to the example of X World [figure 1-3]
Figure 2-5
There is no suspense here, just use the code of an example to achieve encryption, and solve the case.
This is the end of the content of "what is the method of Python password encryption". Thank you for your reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.