最近坛内出现不少关于某浪的逆向分析教学教学贴
1.某浪视频获取
2.某浪m3u8解密简单分析
3.某浪新版key解密
4.某音平台某浪新版key解密 play_licenses
某浪视频的key并不在m3u8内,现在请求到m3u8以后,还需要请求一个play_licenses的接口,请求到之后返回的是加密的key
跟踪堆栈调试时,会发现进行了一个大循环
解密过程涉及jsvmp,为了方便使用,封装成dll进行处理
Python调用案例
dll = ctypes.WinDLL('snssdk.dll', winmode=0)
dll.init_wasm()
dll.decrypt_key.argtypes = [ctypes.c_char_p]
dll.decrypt_key.restype = ctypes.c_char_p
ckey = dll.decrypt_key(ctypes.c_char_p(b"muZOqFO3H6hTiHKVa9t3xGvYcZub")).decode()
print(ckey) # 1d45c6d6841e4752
ckey = dll.decrypt_key(ctypes.c_char_p(b"ouZ2xWyJTcYA5R2rAIoclAHESuYE+RnYAJcetgmpFOBYsELAwA==")).decode()
print(ckey) # 991b8fe94e58466fb9f6592f69076bff
增加python的exe调用案例
snssdk = os.popen('snssdk muZOqFO3H6hTiHKVa9t3xGvYcZub')
key = snssdk.read()
print(key) # 1d45c6d6841e4752
snssdk = os.popen('snssdk ouZ2xWyJTcYA5R2rAIoclAHESuYE+RnYAJcetgmpFOBYsELAwA==')
key = snssdk.read()
print(key) # 991b8fe94e58466fb9f6592f69076bff
下载地址:见附件