0x01 前言
宝子们现在只对常读和星标的公众号才展示大图推送,建议大家把李白你好“设为星标”,否则可能就看不到了啦!
0x01 前言
这是某专属src的app资产,比较冷门,无意间收集到了,当初因为一些原因,搁置了下来,没有进行测试,现在手头有空了,回过头来看看。
0x02 开始&经过
function credital_encrypt(){
Java.perform(function(){
console.log("Fucking credital...")
Java.use("com.richfit.qixin.utils.CipherUtil").encryptTokenpassword.implementation = function(str1,str2,str3,str4){
//str1->username; str2->""; str3->password; str4->""
var res = this.encryptTokenpassword("test1","","123456","")
//send(res);
console.log(res);
return res;
}
})
}
function main(){
credital_encrypt();
}
setImmediate(main);
function md5_encrypt(){
Java.perform(function(){
console.log("Fucking Md5...")
Java.use("com.richfit.rfutils.utils.MD5Utils").digest.implementation = function(a){
var res = this.digest('64c8d2a0e0b2c0bbb611130862cd7b62{"login_type":"manual","credential":"7S809HYx8eUGDAwKEo2TWUUUrVpj4XgTswTOyU8aS9pdqd+SZqDVP16ieWLj5QzmgXQx4gESwAddmNFSgY1ePclyxnA13JJ8gXQx4gESwAdSOJnrVtdBwjyuh1SMWDnvM6oFcq35MPhnLn91ABYP5hkfnlYuHaO9BSeaVdv2e2Y=","device_type":"android","is_brief":"true"}253')
//send(res);
console.log(res);
return res;
}
})
}
function main(){
md5_encrypt();
}
setImmediate(main);
0x03 总结
JNDIExploit多功能利用工具
实战!一次曲折的钓鱼溯源反制