JS逆向实战1——某省阳光采购服务平台

2022-12-01,,,

分析

其实这个网站基本没有用到过什么逆向,就是简单的图片base64加密 然后把连接变成2进制存成文件 然后用ocr去识别即可

!! 注意 在获取图片连接 和对列表页发起请求时一定要用一个请求,也就是用一个session 不然就会验证失败。

本文网站:aHR0cDovL2dnenkudG9uZ2xpYW8uZ292LmNuL0Vwb2ludFdlYkJ1aWxkZXJfdGxzZ2d6eS9qeXh4SW5mb0FjdGlvbi5hY3Rpb24/Y21kPWdldFZlcmlmaWNhdGlvbkNvZGU=

代码如下

import ddddocr
import requests
from jsonpath import jsonpath
import base64 url = "xxxxx" data = {
"width": "150",
"height": "40",
"codeNum": "4",
"interferenceLine": '4',
"codeGuid": "",
} html = requests.post(url,data=data).json()
image=jsonpath(html,"$..custom")[0] json_image=eval(image)
code = json_image['imgCode'] verificationCodeGuid = json_image['verificationCodeGuid'] data = code.split(',')[1]
image_data = base64.b64decode(data)
with open('code.png', 'wb') as f:
f.write(image_data) with open('code.png','rb') as fp:
image = fp.read() # 利用ocr识别图片
ocr = ddddocr.DdddOcr() result = ocr.classification(image) print(result) print(verificationCodeGuid) # params={
#
# "cmd": "RightInfoList",
# "vname": "/linyiweb",
# "cate": "001001",
# "pageSize": "10",
# "pageIndex": "101",
# "ssqy": "",
# "xmbh": "",
# "ggmc": "",
# "cglb": "",
# "imgguid": "ae3e7c7d-1f8e-4a83-aec0-f2d2aecc411f",
# "yzm": "2W2H",
# } # html = requests.get("xxxxx",params=params).json()

JS逆向实战1——某省阳光采购服务平台的相关教程结束。

《JS逆向实战1——某省阳光采购服务平台.doc》

下载本文的Word格式文档,以方便收藏与打印。