aHR0cDovLzIyMy40LjY1LjEzMTo4MDgwLyMvY29tcGFueQ==
This website comes from the technical exchange group of Xianyu
The structure of this website is very simple, the information of the list page can be directly obtained through the interface, let's take a look
Data can be returned by directly requesting the interface.
The content we need to analyze is the link encryption of the details page, as shown below
Hover the mouse over the blue text and you can see that there is a CORPCODE
parameter after the link (PS: Actually it doesn’t matter whether this parameter is or not, because the dog head is not used for request data)
It can be found directly with the Initiator
of the network panel
Click on the blue link at the back to jump directly
The location of the jump is where the request was made
Here you can see that the parameter that needs to be analyzed is t
It is generated by the following string of expressions
Object(m.b)(e.CorpCode)
So just hit a breakpoint and debug it
The e
here is the content displayed on the list page, which can be obtained from the interface of the list page
The parameter e.CorpCode
here becomes ciphertext after mb
, so the logic of mb
can be realized
Enter the logic of analyzing mb
, you can see the clear encryption logic
The three elements of AES: secret key, padding, offset
All have been displayed in the code, get it on the website to verify
You can see that the encryption is the same as on the page.
Just copy directly in Python, or directly import the encryption library of NodeJS.
However, this parameter is not required for the details page data acquisition, so just take it for fun~