抓了下某 App 的通信,这手机号的加密看不出来,有知道的朋友吗。
加密前:13575307387 ,数组每回都不一样。
加密后:[24,-24,-53,41,114,16,0,-11,-26,17,98,40,24,-98,116,106,-2,117,35,118,52,-90,-69,-3,102,-38,-110,-128,-1,-56,-26,62,-46,93,25,-112,55,-39,-124,113,-71,-17,27,-110,-58,3,124,53,-53,118,66,-33,-64,-114,-13,-34,82,88,64,-22,-55,17,87,46,-72,22,-89,-101,91,82,-50,118,-103,-107,-24,41,16,-43,-33,81,14,-49,-72,-22,-45,-77,-21,103,105,18,-113,-42,-51,-52,-93,12,46,94,-38,17,-7,117,47,84,-77,84,90,-28,-59,93,100,24,44,30,123,13,75,25,-58,90,5,46,-17,-87,52,27,-124,108]
加密后:[7,116,4,31,94,21,111,112,62,-2,-117,42,-84,42,96,-108,-1,-90,6,-89,2,-84,112,-71,38,-5,-114,17,84,17,-97,-5,29,72,12,-126,27,-125,64,62,-126,46,108,-100,-16,106,-37,-33,61,-88,49,112,-92,-9,113,-105,76,78,-73,106,68,-51,-37,51,-48,1,-28,-89,-66,46,0,22,38,-96,50,108,-30,10,-9,-39,40,19,-9,56,-120,-69,-108,74,63,20,102,-94,100,-18,2,-47,-1,-73,31,-94,-31,118,-15,-39,121,-28,-23,3,59,-80,-65,0,8,93,56,60,-92,111,66,58,26,-104,38,29,83,-33,29,67]
1
murmur 345 天前 5
某 app 是啥都不说,自己接的逆向活就应该自己做,我记得 RSA 这种就算是同样的公钥每次加出来都不一样吧
|
2
zuixinwenyue 345 天前
不一样很正常,这种根本看不出什么,对称和非对称加密手段,相同铭文每次加密后的密文都是不一样的
|
3
rekulas 345 天前
每次不一样说明有 salt 啊,128 个块刚好满足 16 倍数,大概率类 aes 对称加密,但你想密文看出什么重要信息就想多了
|
4
yolee599 345 天前
AES CBC 模式也可以每次加密相同的明文返回不同的密文,已知明文和密文,密钥长度为 16 字节,写个算法遍历碰碰运气吧,不过时间估计要很久
|
5
kenvix 345 天前
说明模式不是 ECB ,有 nonce
|
6
tutudou 345 天前
个人感觉应该是个时间戳吧,如果是普通的加盐,盐固定的话,每次加密出来的数据也会是固定的。
|
7
sigmadog 345 天前
如果客户端能解出来,那你直接逆向客户端啊,比自己猜靠谱吧
|