In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces "sample analysis of Python password encryption algorithm". In daily operation, I believe that many people have doubts about the example analysis of Python password encryption algorithm. Xiaobian consulted all kinds of data and sorted out simple and easy-to-use operation methods. I hope it will be helpful to answer the doubts of "sample analysis of Python password encryption algorithm". Next, please follow the editor to study!
Take a look at today's research website:
AHR0cHM6Ly9wYXNzcG9ydC5rb25nemhvbmcuY29tL2xvZ2lu
Parameter position analysis
Let's first take a look at the encrypted request [figure 1-1]
Summary of common confusion in JS reverse
Figure 1-1
I've introduced a lot of articles about how to search for encryption parameters before, so I don't want to talk about it.
In addition to searching for encryption parameters, we should also pay attention to iconic attributes such as id and calssname, which can help us further locate the encryption location.
Quickly navigate to the encrypted entry of the website through the id = password_txt in the password box. [figure 1-2]
Figure 1-2
Make a breakpoint by gradually debugging into the location where the password is added in the virtual engine. [figure 1-3]
Figure 1-4
The encrypt method in the figure above is the encryption method we need, so continue to take a look at the logic recently.
Here, by hovering over the location where the encryption is not prompted on the corresponding method, the partner indicates that he cannot proceed to the next step. We can select the method and click the prompt to jump to [figure 1-4].
Figure 1-4
After successfully jumping into the position of the encryption method, you can dig it out and complete it directly. [figure 1-5]
Figure 1-5
Tip: the second parameter here is returned in the previous request in [figure 1-1].
Complete encryption JS
First deduct the method selected in the box in [figure 1-5] to the editor, and pass in the required parameters according to the breakpoint [figure 2-1]
Figure 2-1
So the result in the editor looks like this [figure 2-2]
Figure 2-2
After running, you will get the encryption parameters.
At this point, the study of "sample analysis of Python password encryption algorithm" is over. I hope to be able to solve everyone's doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.