声明:
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!
前言
研究了一下小程序frida抓包,key、iv自动code。现在这方面市面上教程还是一些,复现了大部分操作,授权code、encryptdata、key、iv。v2滑块更新早上刚改好、中午搞完云函数hook demo(看别人教程的)。下午顺便把最新的web mtgsig1.2给弄了。数组到了70多了。有很多坑细心即可。
逆向过程
总共有70多个需要补。触发也可以不过可能后续有问题,两次补完全部数据即可。我是对比浏览器一个个代理弄的。部分代码如下
cp = execjs.compile(open('2025-4美团.js', 'r', encoding='utf-8').read()) mtgsig = cp.call('getMtgsig')['headers']['mtgsig'] print(mtgsig) import requests headers = { "Accept": "application/json", "Accept-Language": "zh-CN,zh;q=0.9", "Cache-Control": "no-cache", "Connection": "keep-alive", "Content-Type": "application/x-www-form-urlencoded", "Pragma": "no-cache", "Sec-Fetch-Dest": "empty", "Sec-Fetch-Mode": "cors", "Sec-Fetch-Site": "same-site", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36 Edg/133.0.0.0", "mtgsig": mtgsig, "sec-ch-ua": "\"Not(A:Brand\";v=\"99\", \"Microsoft Edge\";v=\"133\", \"Chromium\";v=\"133\"", "sec-ch-ua-mobile": "?0", "sec-ch-ua-platform": "\"Windows\"" } cookies = { } url = "" params = { "set_name": "", "region_id": "", "_": "1742474016873", "yodaReady": "h5", "csecplatform": "4", "csecversion": "3.1.0" } data = { } response = requests.post(url, headers=headers, cookies=cookies, params=params, data=data,proxies=proxies) print(response.text) print(response)