Python + Node 实现搜狐闪电邮箱模拟登录

解决搜狐闪电邮箱 password 密码md5加密、cookie 生成逻辑(包括 jsfuck 代码还原)

前言

本文仅供学习使用,禁止用于其他用途

目标网站

1
https://mail.sohu.com/fe/#/login

逆向目标

password md5加密:
sohu_01

请求头 cookie 中的 gidinfjv
sohu_02

逆向分析

password

全局搜索 md5
sohu_03

sohu_04

在第200行打上断点:
sohu_05

可以得知 args 参数就是密码 password

扣下来的代码:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
const md5 = function (args) {

function hex_md5(s) {
return binl2hex(core_md5(str2binl(s), s.length * chrsz))
}
function core_md5(x, len) {
x[len >> 5] |= 128 << len % 32,
x[14 + (len + 64 >>> 9 << 4)] = len;
for (var a = 1732584193, b = -271733879, c = -1732584194, d = 271733878, i = 0; i < x.length; i += 16) {
var olda = a
, oldb = b
, oldc = c
, oldd = d;
a = md5_ff(a, b, c, d, x[i + 0], 7, -680876936),
d = md5_ff(d, a, b, c, x[i + 1], 12, -389564586),
c = md5_ff(c, d, a, b, x[i + 2], 17, 606105819),
b = md5_ff(b, c, d, a, x[i + 3], 22, -1044525330),
a = md5_ff(a, b, c, d, x[i + 4], 7, -176418897),
d = md5_ff(d, a, b, c, x[i + 5], 12, 1200080426),
c = md5_ff(c, d, a, b, x[i + 6], 17, -1473231341),
b = md5_ff(b, c, d, a, x[i + 7], 22, -45705983),
a = md5_ff(a, b, c, d, x[i + 8], 7, 1770035416),
d = md5_ff(d, a, b, c, x[i + 9], 12, -1958414417),
c = md5_ff(c, d, a, b, x[i + 10], 17, -42063),
b = md5_ff(b, c, d, a, x[i + 11], 22, -1990404162),
a = md5_ff(a, b, c, d, x[i + 12], 7, 1804603682),
d = md5_ff(d, a, b, c, x[i + 13], 12, -40341101),
c = md5_ff(c, d, a, b, x[i + 14], 17, -1502002290),
b = md5_ff(b, c, d, a, x[i + 15], 22, 1236535329),
a = md5_gg(a, b, c, d, x[i + 1], 5, -165796510),
d = md5_gg(d, a, b, c, x[i + 6], 9, -1069501632),
c = md5_gg(c, d, a, b, x[i + 11], 14, 643717713),
b = md5_gg(b, c, d, a, x[i + 0], 20, -373897302),
a = md5_gg(a, b, c, d, x[i + 5], 5, -701558691),
d = md5_gg(d, a, b, c, x[i + 10], 9, 38016083),
c = md5_gg(c, d, a, b, x[i + 15], 14, -660478335),
b = md5_gg(b, c, d, a, x[i + 4], 20, -405537848),
a = md5_gg(a, b, c, d, x[i + 9], 5, 568446438),
d = md5_gg(d, a, b, c, x[i + 14], 9, -1019803690),
c = md5_gg(c, d, a, b, x[i + 3], 14, -187363961),
b = md5_gg(b, c, d, a, x[i + 8], 20, 1163531501),
a = md5_gg(a, b, c, d, x[i + 13], 5, -1444681467),
d = md5_gg(d, a, b, c, x[i + 2], 9, -51403784),
c = md5_gg(c, d, a, b, x[i + 7], 14, 1735328473),
b = md5_gg(b, c, d, a, x[i + 12], 20, -1926607734),
a = md5_hh(a, b, c, d, x[i + 5], 4, -378558),
d = md5_hh(d, a, b, c, x[i + 8], 11, -2022574463),
c = md5_hh(c, d, a, b, x[i + 11], 16, 1839030562),
b = md5_hh(b, c, d, a, x[i + 14], 23, -35309556),
a = md5_hh(a, b, c, d, x[i + 1], 4, -1530992060),
d = md5_hh(d, a, b, c, x[i + 4], 11, 1272893353),
c = md5_hh(c, d, a, b, x[i + 7], 16, -155497632),
b = md5_hh(b, c, d, a, x[i + 10], 23, -1094730640),
a = md5_hh(a, b, c, d, x[i + 13], 4, 681279174),
d = md5_hh(d, a, b, c, x[i + 0], 11, -358537222),
c = md5_hh(c, d, a, b, x[i + 3], 16, -722521979),
b = md5_hh(b, c, d, a, x[i + 6], 23, 76029189),
a = md5_hh(a, b, c, d, x[i + 9], 4, -640364487),
d = md5_hh(d, a, b, c, x[i + 12], 11, -421815835),
c = md5_hh(c, d, a, b, x[i + 15], 16, 530742520),
b = md5_hh(b, c, d, a, x[i + 2], 23, -995338651),
a = md5_ii(a, b, c, d, x[i + 0], 6, -198630844),
d = md5_ii(d, a, b, c, x[i + 7], 10, 1126891415),
c = md5_ii(c, d, a, b, x[i + 14], 15, -1416354905),
b = md5_ii(b, c, d, a, x[i + 5], 21, -57434055),
a = md5_ii(a, b, c, d, x[i + 12], 6, 1700485571),
d = md5_ii(d, a, b, c, x[i + 3], 10, -1894986606),
c = md5_ii(c, d, a, b, x[i + 10], 15, -1051523),
b = md5_ii(b, c, d, a, x[i + 1], 21, -2054922799),
a = md5_ii(a, b, c, d, x[i + 8], 6, 1873313359),
d = md5_ii(d, a, b, c, x[i + 15], 10, -30611744),
c = md5_ii(c, d, a, b, x[i + 6], 15, -1560198380),
b = md5_ii(b, c, d, a, x[i + 13], 21, 1309151649),
a = md5_ii(a, b, c, d, x[i + 4], 6, -145523070),
d = md5_ii(d, a, b, c, x[i + 11], 10, -1120210379),
c = md5_ii(c, d, a, b, x[i + 2], 15, 718787259),
b = md5_ii(b, c, d, a, x[i + 9], 21, -343485551),
a = safe_add(a, olda),
b = safe_add(b, oldb),
c = safe_add(c, oldc),
d = safe_add(d, oldd)
}
return Array(a, b, c, d)
}
function md5_cmn(q, a, b, x, s, t) {
return safe_add(bit_rol(safe_add(safe_add(a, q), safe_add(x, t)), s), b)
}
function md5_ff(a, b, c, d, x, s, t) {
return md5_cmn(b & c | ~b & d, a, b, x, s, t)
}
function md5_gg(a, b, c, d, x, s, t) {
return md5_cmn(b & d | c & ~d, a, b, x, s, t)
}
function md5_hh(a, b, c, d, x, s, t) {
return md5_cmn(b ^ c ^ d, a, b, x, s, t)
}
function md5_ii(a, b, c, d, x, s, t) {
return md5_cmn(c ^ (b | ~d), a, b, x, s, t)
}
function safe_add(x, y) {
var lsw = (65535 & x) + (65535 & y);
return (x >> 16) + (y >> 16) + (lsw >> 16) << 16 | 65535 & lsw
}
function bit_rol(num, cnt) {
return num << cnt | num >>> 32 - cnt
}
function str2binl(str) {
for (var bin = Array(), mask = (1 << chrsz) - 1, i = 0; i < str.length * chrsz; i += chrsz)
bin[i >> 5] |= (str.charCodeAt(i / chrsz) & mask) << i % 32;
return bin
}
function binl2hex(binarray) {
for (var hex_tab = hexcase ? "0123456789ABCDEF" : "0123456789abcdef", str = "", i = 0; i < 4 * binarray.length; i++)
str += hex_tab.charAt(binarray[i >> 2] >> i % 4 * 8 + 4 & 15) + hex_tab.charAt(binarray[i >> 2] >> i % 4 * 8 & 15);
return str
}
var hexcase = 0
, chrsz = 8;
return hex_md5(args)
}

console.log(md5('abc123'))

在 Node 中运行的结果与浏览器一致:

1
e99a18c428cb38d5f260853678922e03

gidinf

首先在浏览器设置里清除cookie,然后刷新页面,找到请求:
sohu_06

gidinfreqtype 在响应头里;请求头也需要添加一个 cookie

请求参数后面的数字明显是时间戳:
sohu_07

Python代码:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
import time

import requests

# 时间戳
t = int(time.time() * 1000)

def get_cookie_gidinf():
url = 'https://v4.passport.sohu.com/i/cookie/common?'
headers = {
'Cookie': f'a=123; t={t}',
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Edg/106.0.1370.42'
}
params = {
'callback': f'passport403_cb{t}',
'_': f'{t + 259}'
}
res = requests.get(url, headers=headers, params=params)
return dict(res.cookies)

print(get_cookie_gidinf())

结果:

1
{'gidinf': 'x099980109ee15f412907fcf300023cc22c203307c1a', 'reqtype': 'pc'}

jv

有一个请求返回了看起来很奇怪的内容:
sohu_08

这是 jsfuck,仅用6个符号 []()!+ 组成

jsfuck 官方:

1
https://github.com/aemkei/jsfuck

将双引号括起来的 jsfuck 放在控制台执行:
sohu_09

在 Node 中执行需要处理一下 jsfuck

1
2
3
将最后面的 () 移到最右侧
- .....!![]+[+!![]]])())
+ .....!![]+[+!![]]]))()

js代码

1
2
3
4
5
// jsfuck 字符太多了,就不放了,注意最右侧的 ()
const jsfuck = '....!![]+[+!![]]]))()'

const jv = eval(jsfuck)
console.log(jv)

运行结果:
sohu_10