Skip to content

Commit 97cb1a5

Browse files
committed
天天基金网-模拟登录参数解密过程
1 parent 435c79f commit 97cb1a5

2 files changed

Lines changed: 13 additions & 1 deletion

File tree

1234567.py

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,18 @@
99
参数格式:{"CS":"MCUyQzAlMkMxMzgwMDAwMDAwMCUyQzEyMzQ1NiUyQzAlMkMlMkM="}
1010
参数产生:data:JSON.stringify({CS:JsEncrpt.encode(encodeURIComponent(opts.TabID+","+at+","+$.trim(name)+","+escape($.trim(tbpwd.val()))+","+$("#hidenum").val()+","+tbcode.val()+","+direct))}),
1111
获取表单数据加密方法:https://trade.1234567.com.cn/js/jsencrpt.js
12+
13+
上面可以看出,6个逗号,应该是7个参数
14+
为了查看参数具体的组成,需要解密来验证一下(这里是对称加密,没有什么复杂度)
15+
解密方法已经写在这里:
16+
/template/index.html
17+
启动web服务
18+
$ source pyenv/bin/activate
19+
$ python web.py
20+
访问http://localhost:8000/
21+
得到解密后的参数构成如下:
22+
0,0,13800000000,123456,0,,
23+
模拟登录只需要构造成这个结构就可以了
1224
"""
1325

1426
import requests

template/index.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
<script type="text/javascript" src="/static/js/jsencrpt.js"></script>
77
<script type="text/javascript">
88
window.onload = function () {
9-
var text = JsEncrpt.decode("MCUyQzAlMkMxMzgxODczMjU5NCUyQzEyMzQ1NiUyQzAlMkMlMkM=");
9+
var text = JsEncrpt.decode("MCUyQzAlMkMxMzgwMDAwMDAwMCUyQzEyMzQ1NiUyQzAlMkMlMkM=");
1010
var text2 = decodeURIComponent(text);
1111
alert(text2);
1212
}

0 commit comments

Comments
 (0)