首页 > 其他分享 >拼多多滑块逆向

拼多多滑块逆向

时间:2024-08-03 14:05:40浏览次数:15  
标签:逆向 滑块 180 168 169 多多 176 165 172


声明(lianxi a15018601872)
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!  
前言(lianxi a15018601872)
挺有意思的拼多多滑块,搞了一会。说一下踩坑流程,和破解思路。
1.anti_content
这个以后再说,搞海外拼多多我会细说现在就算了。以练习滑块为主。不过这个anti_content很奇怪。我仔细看了一下他的检测点和本地做对比我之前只补了60多行的那个竟然能跑明明挺多监测点都被检测了。不过我今天随便把他补完了本来是本来说不想补的后面说原因。
2.滑块处理
主要需要这几个参数。

verify_code是把识别的距离做一些小处理。verify_auth_token是第一步获取的一个token。

最重要的是anti_content和collect。collect里面包含了很多信息。如图

'verify_code': verify_code,
'captcha_collect': captcha_collect,
'verify_auth_token': verifyAuthToken,
'anti_content': requests.get('http://localhost:3000/login').text
imageSize固定的。del是轨迹开头坐标,mel滑动过程 ,uel是最后一个滑动轨迹坐标,最后一个是图片加载后在页面上的滑动轨迹和mel加在一起。所以用贝塞尔曲线直接构造就行了。注意时间戳就行了。我刚开始以为是anti_content没补好,在滑块处严格检测所以补完了。

[
{
"KEY": "imageSize",
"data": {
"width": 272,
"height": 198
}
},
{
"KEY": "del",
"MAX_LENGTH": 50,
"data": [
[
32,
180,
1719757842387
]
],
"preTimeStamp": 1500000.6000000015
},
{
"KEY": "mel",
"MAX_LENGTH": 400,
"data": [
[
32,
180,
1719757842469
],
[
36,
180,
1719757842485
],
[
44,
178,
1719757842501
],
[
53,
177,
1719757842517
],
[
63,
176,
1719757842533
],
[
69,
176,
1719757842548
],
[
74,
176,
1719757842565
],
[
80,
176,
1719757842581
],
[
89,
176,
1719757842596
],
[
102,
176,
1719757842613
],
[
111,
176,
1719757842629
],
[
118,
176,
1719757842644
],
[
124,
176,
1719757842660
],
[
128,
176,
1719757842677
],
[
132,
176,
1719757842692
],
[
134,
176,
1719757842709
],
[
137,
176,
1719757842725
],
[
139,
176,
1719757842741
],
[
140,
176,
1719757842757
],
[
143,
176,
1719757842773
],
[
144,
176,
1719757842789
],
[
147,
175,
1719757842805
],
[
150,
174,
1719757842821
],
[
152,
174,
1719757842837
],
[
155,
173,
1719757842853
],
[
157,
172,
1719757842876
],
[
160,
172,
1719757842893
],
[
163,
171,
1719757842908
],
[
164,
170,
1719757842925
],
[
167,
169,
1719757842948
],
[
168,
169,
1719757843357
],
[
170,
169,
1719757843402
],
[
171,
169,
1719757843428
],
[
172,
168,
1719757843454
],
[
172,
168,
1719757843479
],
[
178,
168,
1719757843509
],
[
180,
168,
1719757843533
],
[
183,
168,
1719757843551
],
[
187,
168,
1719757843568
],
[
189,
168,
1719757843581
],
[
192,
168,
1719757843597
],
[
195,
168,
1719757843612
],
[
196,
168,
1719757843629
],
[
198,
168,
1719757843645
],
[
200,
167,
1719757843669
],
[
201,
167,
1719757843685
],
[
203,
167,
1719757843716
],
[
204,
166,
1719757843732
],
[
204,
166,
1719757843748
],
[
205,
166,
1719757843772
],
[
207,
165,
1719757843796
],
[
208,
165,
1719757843812
],
[
210,
165,
1719757843828
],
[
211,
165,
1719757843844
],
[
212,
165,
1719757843860
],
[
216,
165,
1719757843962
],
[
217,
165,
1719757843972
],
[
219,
165,
1719757843988
],
[
220,
165,
1719757844116
],
[
220,
165,
1719757844140
],
[
221,
165,
1719757844180
],
[
222,
165,
1719757844244
],
[
223,
165,
1719757844300
]
],
"preTimeStamp": 1501912.299999997
},
{
"KEY": "uel",
"MAX_LENGTH": 50,
"data": [
[
223,
165,
1719757844435
]
],
"preTimeStamp": 1502048.299999997
},
{
"KEY": "mell",
"MAX_LENGTH": 200,
"data": [
[
[
200,
44,
1719757841775
],
[
200,
45,
1719757841791
],
[
192,
61,
1719757841883
],
[
188,
67,
1719757841888
],
[
183,
77,
1719757841903
],
[
172,
94,
1719757841918
],
[
159,
113,
1719757841935
],
[
142,
135,
1719757841951
],
[
129,
150,
1719757841967
],
[
118,
160,
1719757841983
],
[
110,
166,
1719757842000
],
[
105,
169,
1719757842014
],
[
102,
171,
1719757842031
],
[
96,
173,
1719757842046
],
[
89,
175,
1719757842087
],
[
81,
177,
1719757842095
],
[
76,
178,
1719757842106
],
[
75,
178,
1719757842127
],
[
74,
178,
1719757842143
],
[
72,
178,
1719757842159
],
[
71,
179,
1719757842175
],
[
66,
180,
1719757842191
],
[
58,
180,
1719757842207
],
[
51,
180,
1719757842223
],
[
44,
180,
1719757842239
],
[
39,
180,
1719757842255
],
[
35,
180,
1719757842271
],
[
32,
180,
1719757842286
]
],
[
[
32,
180,
1719757842471
],
[
36,
180,
1719757842487
],
[
44,
178,
1719757842503
],
[
53,
177,
1719757842519
],
[
63,
176,
1719757842535
],
[
69,
176,
1719757842550
],
[
74,
176,
1719757842567
],
[
80,
176,
1719757842583
],
[
89,
176,
1719757842598
],
[
102,
176,
1719757842616
],
[
111,
176,
1719757842631
],
[
118,
176,
1719757842647
],
[
124,
176,
1719757842663
],
[
128,
176,
1719757842678
],
[
132,
176,
1719757842694
],
[
134,
176,
1719757842711
],
[
137,
176,
1719757842726
],
[
139,
176,
1719757842743
],
[
140,
176,
1719757842760
],
[
143,
176,
1719757842776
],
[
144,
176,
1719757842791
],
[
147,
175,
1719757842807
],
[
150,
174,
1719757842823
],
[
152,
174,
1719757842839
],
[
155,
173,
1719757842855
],
[
157,
172,
1719757842878
],
[
160,
172,
1719757842895
],
[
163,
171,
1719757842910
],
[
164,
170,
1719757842927
],
[
167,
169,
1719757842950
],
[
168,
169,
1719757843359
],
[
170,
169,
1719757843406
],
[
171,
169,
1719757843430
],
[
172,
168,
1719757843457
],
[
172,
168,
1719757843506
],
[
178,
168,
1719757843512
],
[
180,
168,
1719757843535
],
[
183,
168,
1719757843565
],
[
187,
168,
1719757843571
],
[
189,
168,
1719757843584
],
[
192,
168,
1719757843599
],
[
195,
168,
1719757843614
],
[
196,
168,
1719757843632
],
[
198,
168,
1719757843647
],
[
200,
167,
1719757843670
],
[
201,
167,
1719757843687
],
[
203,
167,
1719757843717
],
[
204,
166,
1719757843733
],
[
204,
166,
1719757843749
],
[
205,
166,
1719757843773
],
[
207,
165,
1719757843797
],
[
208,
165,
1719757843813
],
[
210,
165,
1719757843829
],
[
211,
165,
1719757843845
],
[
212,
165,
1719757843861
],
[
216,
165,
1719757843963
],
[
217,
165,
1719757843973
],
[
219,
165,
1719757843990
],
[
220,
165,
1719757844117
],
[
220,
165,
1719757844141
],
[
221,
165,
1719757844181
],
[
222,
165,
1719757844245
],
[
223,
165,
1719757844302
]
]
],
"preTimeStamp": 1501912.299999997
}
]
结果

总结 
1.出于安全考虑,本章未提供完整流程,调试环节省略较多,只提供大致思路,具体细节要你自己还原,相信你也能调试出来。

lianxi 看首页

标签:逆向,滑块,180,168,169,多多,176,165,172
From: https://www.cnblogs.com/yeweilin/p/18340409

相关文章

  • douyin 今日头条 巨量登录滑块和douyin详情滑块分析
    声明(lianxia15018601872)本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!前言(lianxia15018601872)这个douyin滑块基本字节系列通用的其中双轨迹验证挺邪门......
  • 从零开始学逆向CTF比赛,免费参加,欢迎来玩!
    大家好,我是轩辕。告诉大家一个好消息:我准备了一次逆向CTF比赛,面向所有人开放,无需购买课程,优秀的小伙伴还有奖励,参赛方式在文末会介绍,欢迎大家一起来玩。举办这次CTF比赛,是为了检验大家从零开始学逆向的学习成果。就在不久前,我的这套视频课程终于完结了。不过要友情提醒一下,......
  • idea java 逆向脚本
    逆向脚本target_app="/Users/voidm/Applications/GoLand.app"rewrite_file="$(pwd)/../out/production/java_dev/com/jetbrains/ls/responses/License.class"rewrite_file2="$(pwd)/../out/production/java_dev/com/jetbrains/ls/responses/License\......
  • “外挂”——逆向软件的分析与破解
    本文来源无问社区,更多实战内容,渗透思路可前往查看http://www.wwlib.cn/index.php/artread/artid/11458.html#maodian1前言:“外挂”的制作离不开软件的分析破解,这平时做ctf中的逆向题是有⼀定的差别的。最直观的区别体现在两者的⼤⼩。⼀个逆向题⼀般只有⼀两兆⼤⼩,⽽⼀般的软......
  • SQL连续查询问题拓展—记上海拼多多非技术岗面试真题
    真巧,昨天刚写了关于数据库连续问题的解决方案,没想到今天下午两点就有朋友在上海拼多多面试非技术岗位中就遇到了相似的问题。下面是原题:一个最大连续支付失败的次数有一张支付流水表pay;字段如下iduidtimestatuspay_0112024-01-1510:00:00failpay_021202......
  • Python爬虫 - js逆向之扣出某平台的_signature加密字段
    前言好久没有做逆向案例分析了,最近都在看同行朋友写好的案例,感觉学到很多,算是取长补短了不多bb,机缘巧合下,拿到个目标网站分析首先抓个包,就看到请求参数里带着这几个参数主要就是_signature了,其他的参数都不重要得想必你一看就知道啥意思了。行,开始分析_signature......
  • JS逆向 (简单)
    在该网站输入账户123和密码123F12抓包发生密码被加密成74ce2ba17b2c218246e778fb5e895c95,并且密码字段为pwd点击搜索搜索pwd,并且查看是哪里给他加密的发现此处有用到加密,但不是pwd是hiddenPwd,在这个周围看看发现他把hiddenPwd的值赋值给pwd查看里面password的值......
  • 【3DOF关节式(RRR)机械臂设计与运动学】3DOF关节式(RRR)机械臂的设计及其正向与逆向运
      ......
  • 企知道 接口逆向:AES加密
    ......
  • js逆向之补环境-proxy
    目录【1】补环境介绍【2】proxy代理监控器【1】补环境介绍浏览器环境:是指JS代码在浏览器中的运行时环境,它包括V8自动构建的对象(即ECMAScript的内容,如Date、Array),浏览器(内置)传递给V8的操作DOM和BOM的对象(如document、navigator);Node环境:是基于V8引擎的Js运行时环境,它包括V8与......