0x01 前言
宝子们现在只对常读和星标的公众号才展示大图推送,建议大家把李白你好“设为星标”,否则可能就看不到了啦!
0x01 前言
这是某专属src的app资产,比较冷门,无意间收集到了,当初因为一些原因,搁置了下来,没有进行测试,现在手头有空了,回过头来看看。
0x02 开始&经过
function credital_encrypt(){Java.perform(function(){console.log("Fucking credital...")Java.use("com.richfit.qixin.utils.CipherUtil").encryptTokenpassword.implementation = function(str1,str2,str3,str4){//str1->username; str2->""; str3->password; str4->""var res = this.encryptTokenpassword("test1","","123456","")//send(res);console.log(res);return res;}})}function main(){credital_encrypt();}setImmediate(main);
function md5_encrypt(){Java.perform(function(){console.log("Fucking Md5...")Java.use("com.richfit.rfutils.utils.MD5Utils").digest.implementation = function(a){var res = this.digest('64c8d2a0e0b2c0bbb611130862cd7b62{"login_type":"manual","credential":"7S809HYx8eUGDAwKEo2TWUUUrVpj4XgTswTOyU8aS9pdqd+SZqDVP16ieWLj5QzmgXQx4gESwAddmNFSgY1ePclyxnA13JJ8gXQx4gESwAdSOJnrVtdBwjyuh1SMWDnvM6oFcq35MPhnLn91ABYP5hkfnlYuHaO9BSeaVdv2e2Y=","device_type":"android","is_brief":"true"}253')//send(res);console.log(res);return res;}})}function main(){md5_encrypt();}setImmediate(main);
0x03 总结
JNDIExploit多功能利用工具
实战!一次曲折的钓鱼溯源反制