目标网站
aHR0cHM6Ly95Z3AuZ2R6d2Z3Lmdvdi5jbi8jLzQ0L3NjenQteHEvP3VzZXJJZD02NzM4OTg2MzkyNjA3NzAzMDQmcm93SWQ9NTI1MDYyMDI2ODg0NzE2NTQ0JnRpbWU9MjAwOC0xMS0yNiZjZXJ0aWZpY2F0ZU5vPTkxNDQwOTA0NjgyNDI2MzU4QyZjZXJ0aWZpY2F0ZVR5cGU9Mjg=
一、抓包分析
请求头参数加密

二、逆向分析
xhr断点

异步栈

进入u方法内部

一部分加密参数已经生成


扣取响应代码,本地生成

数据获取

本文章仅提供技术分享交流学习,不可对目标服务器造成伤害!