这是通过秘钥加密后发送的数据:{220,37,56,129,71,21,55,138,51,195,18,20,119,229,132,191,192,170,167,238,156,166,240,86,62,154,34,92,122,75,50,103,151,62,135,157,196,132,62,46,252,214,143,152,170,232,83,243,131,30,88,107,189,37,79,226,135,26,177,25,120,220,217,78,255,165,248,78,90,136,84,218,64,76,40,156,66,207,242,144,214,27,138,42,29,59,236,239,104,170,1,159,247,1,228,243,122,96,221,30,50,22,54,154,118,105,249,131,173,254,255,182,163,228,26,57,132,48,196,239,233,26,214,231,252,50,157,80,52,78,140,142,222,106,32,27,236,116,65,83,54,171,73,154,137,188}
,之前直接是可以解密的,但是服务器应该更新过,然后就解密不了了。
抓包后发现返回的秘钥跟之前的格式是一样的,求大神解惑,如果能帮忙写出破解的解密函数,可以另外付钱,价格包你满意。
ps:猜测可能是秘钥做了点小动作。之前返回的秘钥格式是:{38,0,0,0,1,0,3,0,0,0,0,0,0,0,0,0,0,0,0,0,110,81,68,11,78,24,113,111,124,140,156,129,187,12,236,75} 。
现在的格式变长了,多了一点数据。
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)