Python利用PyExecJS库执行JS函数
在web渗透流程的暴力登录场景和爬虫抓取场景中,经常会遇到一些登录表单用des之类的加密方式来加密参数,也就是说,你不搞定这些前端加密,你的编写的脚本是不可能login成功的。针对这个问题,现在有三种解决方式:
- ①看懂前端的加密流程,然后用脚本编写这些方法(或者找开源的源码),模拟这个加密的流程。缺点是:不懂js的话,看懂的成本就比较高了;
- ②selenium + chrome headless。缺点是:因为是模拟点击,所以效率相对①、③低一些;
- ③使用语言调用js引擎来执行js函数。缺点是:每个js引擎执行的效果会不一致,导致一些小偏差;
第③种方式中,python语言能利用的库有pyexecjs、pyv8、js2py三种,pyv8使用就报错(我暂时没解决),js2py相当于将js翻译成pyhton,js2py对于复杂js而言非常容易出错。所以本文主要讨论通过python语言的pyexecjs库(切换不同的js引擎)来执行js函数的过程。
pyexecjs官网案例
pip 安装:pip install pyexecjs
demo:
import execjs print(execjs.eval("'red yellow blue'.split(' ')")) ctx = execjs.compile(""" function add(x, y) { return x + y; } """) print(ctx.call("add", 1, 2))
输出:
['red', 'yellow', 'blue'] 3
查看js引擎信息
# 1.在windows上不需要其他的依赖便可运行execjs, 因为默认有个jscript库,如果要运行其他js引擎库,就需要另外安装了。 # windows默认执行的js环境 execjs.get().name #返回值: jscript # 如果想要切换,用os.environ["execjs_runtime"] = "xxx",如果刚安装完其他js引擎,必须配置环境变量,还可能需要重启电脑或重启ide。 # 如果windows上装有node.js , 可以切换node os.environ["execjs_runtime"] = "node" print(execjs.get().name) #返回值: node.js (v8) # 如果windows上装有phantomjss , 可以切换phantomjs os.environ["execjs_runtime"] = "phantomjs" print(execjs.get().name) #返回值: phantomjs # 2.在ubuntu下需要安装执行js环境依赖, 作者的环境为phantomjs execjs.get().name #返回值: phantomjs # 3.源码中给出, 可执行execjs的环境: pyv8 = "pyv8" node = "node" javascriptcore = "javascriptcore" spidermonkey = "spidermonkey" jscript = "jscript" phantomjs = "phantomjs" slimerjs = "slimerjs" nashorn = "nashorn"
安装phantomjs步骤
下载地址:
http://phantomjs.org/download.html
拷贝到脚本到你的python环境里:
把下载下来的文件解压,找到目录里.\phantomjs-2.1.1\bin\
下的phantomjs.exe,移动到使用的python文件夹下的script中。
# 举例 anaconda3 d:\programfiles\anaconda3\scripts
添加系统变量:d:\programfiles\anaconda3\scriptsphantomjs.exe
添加到系统变量中。
验证:
添加环境变量后,在cmd中验证可以使用phantomjs命令,说明环境搭建好了。
在python中切换成phantomjs:
os.environ["execjs_runtime"] = "phantomjs"
案例1
1.访问目标网站的登录页面并查看源码
访问 http://www.xxx.cn/login.html 查看一下在提交表单之前js对输入的账号、密码做了什么操作。(如下是伪代码)
<html> <head></head> <script src="http://www.xxx.cn/js/a.js"></script> <script> function password(psw, code, acc) { return "[p]" + cryptojs.e(cryptojs.md5(cryptojs.md5(cryptojs.md5(psw).tostring() + code).tostring()).tostring() + "@" + acc, code); } function doencodeacc(acc, code) { alert("[p]" + cryptojs.e(acc, code)); } doencodeacc("zhansan123456","pyr6btle"); </script> <body> </body> </html>
2.将js放到和py脚本同一级目录下
我将整个a.js文件都粘贴到这里,方便需要实验的同学。
/* cryptojs v3.1.2 code.google.com/p/crypto-js (c) 2009-2013 by jeff mott. all rights reserved. code.google.com/p/crypto-js/wiki/license */ var cryptojs=cryptojs||function(u,p){var d={},l=d.lib={},s=function(){},t=l.base={extend:function(a){s.prototype=this;var c=new s;a&&c.mixin(a);c.hasownproperty("init")||(c.init=function(){c.$super.init.apply(this,arguments)});c.init.prototype=c;c.$super=this;return c},create:function(){var a=this.extend();a.init.apply(a,arguments);return a},init:function(){},mixin:function(a){for(var c in a)a.hasownproperty(c)&&(this[c]=a[c]);a.hasownproperty("tostring")&&(this.tostring=a.tostring)},clone:function(){return this.init.prototype.extend(this)}}, r=l.wordarray=t.extend({init:function(a,c){a=this.words=a||[];this.sigbytes=c!=p?c:4*a.length},tostring:function(a){return(a||v).stringify(this)},concat:function(a){var c=this.words,e=a.words,j=this.sigbytes;a=a.sigbytes;this.clamp();if(j%4)for(var k=0;k<a;k++)c[j+k>>>2]|=(e[k>>>2]>>>24-8*(k%4)&255)<<24-8*((j+k)%4);else if(65535<e.length)for(k=0;k<a;k+=4)c[j+k>>>2]=e[k>>>2];else c.push.apply(c,e);this.sigbytes+=a;return this},clamp:function(){var a=this.words,c=this.sigbytes;a[c>>>2]&=4294967295<< 32-8*(c%4);a.length=u.ceil(c/4)},clone:function(){var a=t.clone.call(this);a.words=this.words.slice(0);return a},random:function(a){for(var c=[],e=0;e<a;e+=4)c.push(4294967296*u.random()|0);return new r.init(c,a)}}),w=d.enc={},v=w.hex={stringify:function(a){var c=a.words;a=a.sigbytes;for(var e=[],j=0;j<a;j++){var k=c[j>>>2]>>>24-8*(j%4)&255;e.push((k>>>4).tostring(16));e.push((k&15).tostring(16))}return e.join("")},parse:function(a){for(var c=a.length,e=[],j=0;j<c;j+=2)e[j>>>3]|=parseint(a.substr(j, 2),16)<<24-4*(j%8);return new r.init(e,c/2)}},b=w.latin1={stringify:function(a){var c=a.words;a=a.sigbytes;for(var e=[],j=0;j<a;j++)e.push(string.fromcharcode(c[j>>>2]>>>24-8*(j%4)&255));return e.join("")},parse:function(a){for(var c=a.length,e=[],j=0;j<c;j++)e[j>>>2]|=(a.charcodeat(j)&255)<<24-8*(j%4);return new r.init(e,c)}},x=w.utf8={stringify:function(a){try{return decodeuricomponent(escape(b.stringify(a)))}catch(c){throw error("malformed utf-8 data");}},parse:function(a){return b.parse(unescape(encodeuricomponent(a)))}}, q=l.bufferedblockalgorithm=t.extend({reset:function(){this._data=new r.init;this._ndatabytes=0},_append:function(a){"string"==typeof a&&(a=x.parse(a));this._data.concat(a);this._ndatabytes+=a.sigbytes},_process:function(a){var c=this._data,e=c.words,j=c.sigbytes,k=this.blocksize,b=j/(4*k),b=a?u.ceil(b):u.max((b|0)-this._minbuffersize,0);a=b*k;j=u.min(4*a,j);if(a){for(var q=0;q<a;q+=k)this._doprocessblock(e,q);q=e.splice(0,a);c.sigbytes-=j}return new r.init(q,j)},clone:function(){var a=t.clone.call(this); a._data=this._data.clone();return a},_minbuffersize:0});l.hasher=q.extend({cfg:t.extend(),init:function(a){this.cfg=this.cfg.extend(a);this.reset()},reset:function(){q.reset.call(this);this._doreset()},update:function(a){this._append(a);this._process();return this},finalize:function(a){a&&this._append(a);return this._dofinalize()},blocksize:16,_createhelper:function(a){return function(b,e){return(new a.init(e)).finalize(b)}},_createhmachelper:function(a){return function(b,e){return(new n.hmac.init(a, e)).finalize(b)}}});var n=d.algo={};return d}(math); (function(){var u=cryptojs,p=u.lib.wordarray;u.enc.base64={stringify:function(d){var l=d.words,p=d.sigbytes,t=this._map;d.clamp();d=[];for(var r=0;r<p;r+=3)for(var w=(l[r>>>2]>>>24-8*(r%4)&255)<<16|(l[r+1>>>2]>>>24-8*((r+1)%4)&255)<<8|l[r+2>>>2]>>>24-8*((r+2)%4)&255,v=0;4>v&&r+0.75*v<p;v++)d.push(t.charat(w>>>6*(3-v)&63));if(l=t.charat(64))for(;d.length%4;)d.push(l);return d.join("")},parse:function(d){var l=d.length,s=this._map,t=s.charat(64);t&&(t=d.indexof(t),-1!=t&&(l=t));for(var t=[],r=0,w=0;w< l;w++)if(w%4){var v=s.indexof(d.charat(w-1))<<2*(w%4),b=s.indexof(d.charat(w))>>>6-2*(w%4);t[r>>>2]|=(v|b)<<24-8*(r%4);r++}return p.create(t,r)},_map:"abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789+/="}})(); (function(u){function p(b,n,a,c,e,j,k){b=b+(n&a|~n&c)+e+k;return(b<<j|b>>>32-j)+n}function d(b,n,a,c,e,j,k){b=b+(n&c|a&~c)+e+k;return(b<<j|b>>>32-j)+n}function l(b,n,a,c,e,j,k){b=b+(n^a^c)+e+k;return(b<<j|b>>>32-j)+n}function s(b,n,a,c,e,j,k){b=b+(a^(n|~c))+e+k;return(b<<j|b>>>32-j)+n}for(var t=cryptojs,r=t.lib,w=r.wordarray,v=r.hasher,r=t.algo,b=[],x=0;64>x;x++)b[x]=4294967296*u.abs(u.sin(x+1))|0;r=r.md5=v.extend({_doreset:function(){this._hash=new w.init([1732584193,4023233417,2562383102,271733878])}, _doprocessblock:function(q,n){for(var a=0;16>a;a++){var c=n+a,e=q[c];q[c]=(e<<8|e>>>24)&16711935|(e<<24|e>>>8)&4278255360}var a=this._hash.words,c=q[n+0],e=q[n+1],j=q[n+2],k=q[n+3],z=q[n+4],r=q[n+5],t=q[n+6],w=q[n+7],v=q[n+8],a=q[n+9],b=q[n+10],c=q[n+11],u=q[n+12],d=q[n+13],e=q[n+14],x=q[n+15],f=a[0],m=a[1],g=a[2],h=a[3],f=p(f,m,g,h,c,7,b[0]),h=p(h,f,m,g,e,12,b[1]),g=p(g,h,f,m,j,17,b[2]),m=p(m,g,h,f,k,22,b[3]),f=p(f,m,g,h,z,7,b[4]),h=p(h,f,m,g,r,12,b[5]),g=p(g,h,f,m,t,17,b[6]),m=p(m,g,h,f,w,22,b[7]), f=p(f,m,g,h,v,7,b[8]),h=p(h,f,m,g,a,12,b[9]),g=p(g,h,f,m,b,17,b[10]),m=p(m,g,h,f,c,22,b[11]),f=p(f,m,g,h,u,7,b[12]),h=p(h,f,m,g,d,12,b[13]),g=p(g,h,f,m,e,17,b[14]),m=p(m,g,h,f,x,22,b[15]),f=d(f,m,g,h,e,5,b[16]),h=d(h,f,m,g,t,9,b[17]),g=d(g,h,f,m,c,14,b[18]),m=d(m,g,h,f,c,20,b[19]),f=d(f,m,g,h,r,5,b[20]),h=d(h,f,m,g,b,9,b[21]),g=d(g,h,f,m,x,14,b[22]),m=d(m,g,h,f,z,20,b[23]),f=d(f,m,g,h,a,5,b[24]),h=d(h,f,m,g,e,9,b[25]),g=d(g,h,f,m,k,14,b[26]),m=d(m,g,h,f,v,20,b[27]),f=d(f,m,g,h,d,5,b[28]),h=d(h,f, m,g,j,9,b[29]),g=d(g,h,f,m,w,14,b[30]),m=d(m,g,h,f,u,20,b[31]),f=l(f,m,g,h,r,4,b[32]),h=l(h,f,m,g,v,11,b[33]),g=l(g,h,f,m,c,16,b[34]),m=l(m,g,h,f,e,23,b[35]),f=l(f,m,g,h,e,4,b[36]),h=l(h,f,m,g,z,11,b[37]),g=l(g,h,f,m,w,16,b[38]),m=l(m,g,h,f,b,23,b[39]),f=l(f,m,g,h,d,4,b[40]),h=l(h,f,m,g,c,11,b[41]),g=l(g,h,f,m,k,16,b[42]),m=l(m,g,h,f,t,23,b[43]),f=l(f,m,g,h,a,4,b[44]),h=l(h,f,m,g,u,11,b[45]),g=l(g,h,f,m,x,16,b[46]),m=l(m,g,h,f,j,23,b[47]),f=s(f,m,g,h,c,6,b[48]),h=s(h,f,m,g,w,10,b[49]),g=s(g,h,f,m, e,15,b[50]),m=s(m,g,h,f,r,21,b[51]),f=s(f,m,g,h,u,6,b[52]),h=s(h,f,m,g,k,10,b[53]),g=s(g,h,f,m,b,15,b[54]),m=s(m,g,h,f,e,21,b[55]),f=s(f,m,g,h,v,6,b[56]),h=s(h,f,m,g,x,10,b[57]),g=s(g,h,f,m,t,15,b[58]),m=s(m,g,h,f,d,21,b[59]),f=s(f,m,g,h,z,6,b[60]),h=s(h,f,m,g,c,10,b[61]),g=s(g,h,f,m,j,15,b[62]),m=s(m,g,h,f,a,21,b[63]);a[0]=a[0]+f|0;a[1]=a[1]+m|0;a[2]=a[2]+g|0;a[3]=a[3]+h|0},_dofinalize:function(){var b=this._data,n=b.words,a=8*this._ndatabytes,c=8*b.sigbytes;n[c>>>5]|=128<<24-c%32;var e=u.floor(a/ 4294967296);n[(c+64>>>9<<4)+15]=(e<<8|e>>>24)&16711935|(e<<24|e>>>8)&4278255360;n[(c+64>>>9<<4)+14]=(a<<8|a>>>24)&16711935|(a<<24|a>>>8)&4278255360;b.sigbytes=4*(n.length+1);this._process();b=this._hash;n=b.words;for(a=0;4>a;a++)c=n[a],n[a]=(c<<8|c>>>24)&16711935|(c<<24|c>>>8)&4278255360;return b},clone:function(){var b=v.clone.call(this);b._hash=this._hash.clone();return b}});t.md5=v._createhelper(r);t.hmacmd5=v._createhmachelper(r)})(math); (function(){var u=cryptojs,p=u.lib,d=p.base,l=p.wordarray,p=u.algo,s=p.evpkdf=d.extend({cfg:d.extend({keysize:4,hasher:p.md5,iterations:1}),init:function(d){this.cfg=this.cfg.extend(d)},compute:function(d,r){for(var p=this.cfg,s=p.hasher.create(),b=l.create(),u=b.words,q=p.keysize,p=p.iterations;u.length<q;){n&&s.update(n);var n=s.update(d).finalize(r);s.reset();for(var a=1;a<p;a++)n=s.finalize(n),s.reset();b.concat(n)}b.sigbytes=4*q;return b}});u.evpkdf=function(d,l,p){return s.create(p).compute(d, l)}})(); cryptojs.lib.cipher||function(u){var p=cryptojs,d=p.lib,l=d.base,s=d.wordarray,t=d.bufferedblockalgorithm,r=p.enc.base64,w=p.algo.evpkdf,v=d.cipher=t.extend({cfg:l.extend(),createencryptor:function(e,a){return this.create(this._enc_xform_mode,e,a)},createdecryptor:function(e,a){return this.create(this._dec_xform_mode,e,a)},init:function(e,a,b){this.cfg=this.cfg.extend(b);this._xformmode=e;this._key=a;this.reset()},reset:function(){t.reset.call(this);this._doreset()},process:function(e){this._append(e);return this._process()}, finalize:function(e){e&&this._append(e);return this._dofinalize()},keysize:4,ivsize:4,_enc_xform_mode:1,_dec_xform_mode:2,_createhelper:function(e){return{encrypt:function(b,k,d){return("string"==typeof k?c:a).encrypt(e,b,k,d)},decrypt:function(b,k,d){return("string"==typeof k?c:a).decrypt(e,b,k,d)}}}});d.streamcipher=v.extend({_dofinalize:function(){return this._process(!0)},blocksize:1});var b=p.mode={},x=function(e,a,b){var c=this._iv;c?this._iv=u:c=this._prevblock;for(var d=0;d<b;d++)e[a+d]^= c[d]},q=(d.blockciphermode=l.extend({createencryptor:function(e,a){return this.encryptor.create(e,a)},createdecryptor:function(e,a){return this.decryptor.create(e,a)},init:function(e,a){this._cipher=e;this._iv=a}})).extend();q.encryptor=q.extend({processblock:function(e,a){var b=this._cipher,c=b.blocksize;x.call(this,e,a,c);b.encryptblock(e,a);this._prevblock=e.slice(a,a+c)}});q.decryptor=q.extend({processblock:function(e,a){var b=this._cipher,c=b.blocksize,d=e.slice(a,a+c);b.decryptblock(e,a);x.call(this, e,a,c);this._prevblock=d}});b=b.cbc=q;q=(p.pad={}).pkcs7={pad:function(a,b){for(var c=4*b,c=c-a.sigbytes%c,d=c<<24|c<<16|c<<8|c,l=[],n=0;n<c;n+=4)l.push(d);c=s.create(l,c);a.concat(c)},unpad:function(a){a.sigbytes-=a.words[a.sigbytes-1>>>2]&255}};d.blockcipher=v.extend({cfg:v.cfg.extend({mode:b,padding:q}),reset:function(){v.reset.call(this);var a=this.cfg,b=a.iv,a=a.mode;if(this._xformmode==this._enc_xform_mode)var c=a.createencryptor;else c=a.createdecryptor,this._minbuffersize=1;this._mode=c.call(a, this,b&&b.words)},_doprocessblock:function(a,b){this._mode.processblock(a,b)},_dofinalize:function(){var a=this.cfg.padding;if(this._xformmode==this._enc_xform_mode){a.pad(this._data,this.blocksize);var b=this._process(!0)}else b=this._process(!0),a.unpad(b);return b},blocksize:4});var n=d.cipherparams=l.extend({init:function(a){this.mixin(a)},tostring:function(a){return(a||this.formatter).stringify(this)}}),b=(p.format={}).openssl={stringify:function(a){var b=a.ciphertext;a=a.salt;return(a?s.create([1398893684, 1701076831]).concat(a).concat(b):b).tostring(r)},parse:function(a){a=r.parse(a);var b=a.words;if(1398893684==b[0]&&1701076831==b[1]){var c=s.create(b.slice(2,4));b.splice(0,4);a.sigbytes-=16}return n.create({ciphertext:a,salt:c})}},a=d.serializablecipher=l.extend({cfg:l.extend({format:b}),encrypt:function(a,b,c,d){d=this.cfg.extend(d);var l=a.createencryptor(c,d);b=l.finalize(b);l=l.cfg;return n.create({ciphertext:b,key:c,iv:l.iv,algorithm:a,mode:l.mode,padding:l.padding,blocksize:a.blocksize,formatter:d.format})}, decrypt:function(a,b,c,d){d=this.cfg.extend(d);b=this._parse(b,d.format);return a.createdecryptor(c,d).finalize(b.ciphertext)},_parse:function(a,b){return"string"==typeof a?b.parse(a,this):a}}),p=(p.kdf={}).openssl={execute:function(a,b,c,d){d||(d=s.random(8));a=w.create({keysize:b+c}).compute(a,d);c=s.create(a.words.slice(b),4*c);a.sigbytes=4*b;return n.create({key:a,iv:c,salt:d})}},c=d.passwordbasedcipher=a.extend({cfg:a.cfg.extend({kdf:p}),encrypt:function(b,c,d,l){l=this.cfg.extend(l);d=l.kdf.execute(d, b.keysize,b.ivsize);l.iv=d.iv;b=a.encrypt.call(this,b,c,d.key,l);b.mixin(d);return b},decrypt:function(b,c,d,l){l=this.cfg.extend(l);c=this._parse(c,l.format);d=l.kdf.execute(d,b.keysize,b.ivsize,c.salt);l.iv=d.iv;return a.decrypt.call(this,b,c,d.key,l)}})}(); (function(){for(var u=cryptojs,p=u.lib.blockcipher,d=u.algo,l=[],s=[],t=[],r=[],w=[],v=[],b=[],x=[],q=[],n=[],a=[],c=0;256>c;c++)a[c]=128>c?c<<1:c<<1^283;for(var e=0,j=0,c=0;256>c;c++){var k=j^j<<1^j<<2^j<<3^j<<4,k=k>>>8^k&255^99;l[e]=k;s[k]=e;var z=a[e],f=a[z],g=a[f],y=257*a[k]^16843008*k;t[e]=y<<24|y>>>8;r[e]=y<<16|y>>>16;w[e]=y<<8|y>>>24;v[e]=y;y=16843009*g^65537*f^257*z^16843008*e;b[k]=y<<24|y>>>8;x[k]=y<<16|y>>>16;q[k]=y<<8|y>>>24;n[k]=y;e?(e=z^a[a[a[g^z]]],j^=a[a[j]]):e=j=1}var h=[0,1,2,4,8, 16,32,64,128,27,54],d=d.aes=p.extend({_doreset:function(){for(var a=this._key,c=a.words,d=a.sigbytes/4,a=4*((this._nrounds=d+6)+1),e=this._keyschedule=[],j=0;j<a;j++)if(j<d)e[j]=c[j];else{var k=e[j-1];j%d?6<d&&4==j%d&&(k=l[k>>>24]<<24|l[k>>>16&255]<<16|l[k>>>8&255]<<8|l[k&255]):(k=k<<8|k>>>24,k=l[k>>>24]<<24|l[k>>>16&255]<<16|l[k>>>8&255]<<8|l[k&255],k^=h[j/d|0]<<24);e[j]=e[j-d]^k}c=this._invkeyschedule=[];for(d=0;d<a;d++)j=a-d,k=d%4?e[j]:e[j-4],c[d]=4>d||4>=j?k:b[l[k>>>24]]^x[l[k>>>16&255]]^q[l[k>>> 8&255]]^n[l[k&255]]},encryptblock:function(a,b){this._docryptblock(a,b,this._keyschedule,t,r,w,v,l)},decryptblock:function(a,c){var d=a[c+1];a[c+1]=a[c+3];a[c+3]=d;this._docryptblock(a,c,this._invkeyschedule,b,x,q,n,s);d=a[c+1];a[c+1]=a[c+3];a[c+3]=d},_docryptblock:function(a,b,c,d,e,j,l,f){for(var m=this._nrounds,g=a[b]^c[0],h=a[b+1]^c[1],k=a[b+2]^c[2],n=a[b+3]^c[3],p=4,r=1;r<m;r++)var q=d[g>>>24]^e[h>>>16&255]^j[k>>>8&255]^l[n&255]^c[p++],s=d[h>>>24]^e[k>>>16&255]^j[n>>>8&255]^l[g&255]^c[p++],t= d[k>>>24]^e[n>>>16&255]^j[g>>>8&255]^l[h&255]^c[p++],n=d[n>>>24]^e[g>>>16&255]^j[h>>>8&255]^l[k&255]^c[p++],g=q,h=s,k=t;q=(f[g>>>24]<<24|f[h>>>16&255]<<16|f[k>>>8&255]<<8|f[n&255])^c[p++];s=(f[h>>>24]<<24|f[k>>>16&255]<<16|f[n>>>8&255]<<8|f[g&255])^c[p++];t=(f[k>>>24]<<24|f[n>>>16&255]<<16|f[g>>>8&255]<<8|f[h&255])^c[p++];n=(f[n>>>24]<<24|f[g>>>16&255]<<16|f[h>>>8&255]<<8|f[k&255])^c[p++];a[b]=q;a[b+1]=s;a[b+2]=t;a[b+3]=n},keysize:8});u.aes=p._createhelper(d)})();function _k(h){var e=h+"0123456789abcdef";return e.substring(0, 16);} cryptojs.e = function (d,p) { var key = cryptojs.enc.utf8.parse(_k(p)); var encrypted = cryptojs.aes.encrypt(d, key, { iv: key, mode: cryptojs.mode.cbc, padding: cryptojs.pad.pkcs7 }); return encrypted.tostring(); }; function doencodepsw(psw, code, acc) { return "[p]" + cryptojs.e(cryptojs.md5(cryptojs.md5(cryptojs.md5(psw).tostring() + code).tostring()).tostring() + "@" + acc, code); } function doencodeacc(acc, code) { return "[p]" + cryptojs.e(acc, code); }
3. 编写python脚本来调用js
import execjs def get_js(): # 打开js文件 f = open("a.js", 'r', encoding='utf-8') line = f.readline() htmlstr = '' while line: htmlstr = htmlstr + line line = f.readline() return htmlstr def get_des_psswd(acc, code): jsstr = get_js() # 加载js文件 ctx = execjs.compile(jsstr) # 调用js方法 第一个参数是js的方法名,后面的为js方法的参数 return ctx.call('doencodeacc', acc, code) if __name__ == '__main__': print(get_des_psswd("zhangsan123456", "pyr6btle")) # pyr6btle = ralt code (加密的盐值)
案例2
这个案例相对会复杂一些;
1.找登录时的加密函数
看发包
登录该站时,发现该网站先异步获取了一个公钥,然后账号跟密码都加密了,只能上调试了。建议调试都用chrome f12,其它工具都不如他好使。
右键查看源码,发现有js,但是太多了,过滤一下。
2.监听鼠标点击事件查看流程
一顿操作之后,跳到登录提交的函数,直接看代码
往下看看代码之后,发现代码没加混淆也没有其他防护,那就一步到位解决了,破解这个加密还不跟切菜一样简单了。
3.写代码
导入js:
将jsencrypt.js导入到python项目中,这个js有5千多行,我就不粘贴上来了。
import execjs import os if __name__ == '__main__': # 切换了jscript、node后都无法执行js,发现还是phantomjs靠谱 # os.environ["execjs_runtime"] = "jscript" # os.environ["execjs_runtime"] = "node" os.environ["execjs_runtime"] = "phantomjs" print(execjs.get().name) js = open('jsencrypt.js', encoding='utf-8').read() jo = execjs.compile(js) pwd = jo.call('myf') print(pwd)
输出:
phantomjs hu4ujwqwe/pdablivjnyrx4nrltorxxddyc6+f+p0laqpsegmz16oiqevpihlh5x8zkei2dc3dopvf8zlusucq==
不同浏览器内核版本对url编码处理也不同[冷知识]
当html的表单被提交时,每个表单的参数都会被url编码之后才能被发送。由于历史的原因,表单使用的url编码实现并不符合最新的标准。例如对于空格使用的编码并不是%20
,而是+
号,如果表单使用的是post方法提交的,我们可以在http头中看到有一个content-type的header,值为application/x-www-form-urlencoded。大部分应用程序均能处理这种非标准实现的url编码,但是在客户端javascript中,并没有一个函数能够将+号解码成空格,只能自己写转换函数。还有,对于非ascii字符,使用的编码字符集取决于当前文档使用的字符集。
参考文章
- https://pypi.org/project/pyexecjs
- https://blog.csdn.net/xc_zhou/article/details/80952155
- https://www.cnblogs.com/jerrysion/p/5522673.html
上一篇: iOS:bugly符号表上传