声明:
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!
逆向分析
在学APP中,抽了一些时间把朋友的一个需求一起研究了,听说最近这个又更新研究发现一般ocr识别补了他,打码平台也不行,云码等等都不行,差别大于1就不行坐标还得进行转换得自己训练才行,我是联手项目所以不进行完善整套流程这个滑块应用场景也不大,主要是滑条那种比较多厂商用。所以成功率因为识别距离有问题就不管了。
data = response.json() print(data) PuzzleImage = data['PuzzleImage'] DeviceConfig = data['DeviceConfig'] Image = data['Image'] StaticPath = data['StaticPath'] certifyId = data['CertifyId'] with open('./bg.png', 'wb') as fp: fp.write(session.get(f'/{Image}').content) with open('./fg.png', 'wb') as fp: fp.write(session.get(f'/{PuzzleImage}').content) with open('bg.png', 'rb') as fp: background_bytes = fp.read() with open('fg.png', 'rb') as fp: target_bytes = fp.read() distance1 = int(det.slide_match(target_bytes, background_bytes, simple_target=True)['target'][0] * (296 / 300)) url = "al*.com/" data = cp.call('getLog2', DeviceConfig) headers = { } response = session.post(url, headers=headers, data=data) print(response.text) data = cp.call('getLog3', DeviceConfig) response = session.post('.aliyuncs.com/', headers=headers, data=data) print(response.text) headers = { "Pragma": "no-cache", "Cache-Control": "no-cache", "sec-ch-ua-platform": "\"Windows\"", "X-Requested-With": "XMLHttpRequest", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36 Edg/133.0.0.0", "Content-Type": "application/json", "sec-ch-ua-mobile": "?0", "Sec-Fetch-Site": "same-origin", "Sec-Fetch-Mode": "cors", "Sec-Fetch-Dest": "empty", "Accept-Language": "zh-CN,zh;q=0.9" } cookies = {} result = cp.call('verify', distance,key,certifyId,DeviceConfig,GatherCost)