關注微信公眾號:K哥爬蟲,持續分享爬蟲進階、JS/安卓逆向等技術乾貨!
宣告
本文章中所有內容僅供學習交流,抓包內容、敏感網址、資料介面均已做脫敏處理,嚴禁用於商業用途和非法用途,否則由此產生的一切後果均與作者無關,若有侵權,請在公眾號聯絡我立即刪除!
逆向目標
- 目標:網洛者反反爬蟲練習平臺第七題:JSVMPZL 初體驗
- 連結:http://spider.wangluozhe.com/...
- 簡介:平臺註冊需要邀請碼,站長在群裡,可後臺回覆交流群加群獲取,或者直接加網站底部站長QQ獲取。要求採集100頁的全部數字,並計算所有資料加和。主要難點在於 vvv 大佬開發的 JS 混淆框架:jsvmpzl
逆向過程
直接搜尋,或者跟棧,可以輕鬆找到加密入口,開啟 F12 有兩個反除錯,一是無限 debugger,右鍵 Never pause here 即可,二是定時器,控制檯輸入 for (let i = 1; i < 99999; i++) window.clearInterval(i);
過掉即可。
跟進 y__()
,就可以看到 jsvmpzl 混淆的程式碼了,如果有做過猿人學平臺的題,會發現此混淆和猿人學第 18 題(https://match.yuanrenxue.com/...)是一樣的,在 y__()
第一行下個斷點,觀察 __v_()
第一個引數 _
,_[2][0]
你會發現有關 MD5 演算法的一些特徵,如下圖所示:
那麼我們直接大膽猜測一下,是不是就是某個資料經過 MD5 之後就是 _signature
了呢?再繼續除錯一下,注意 arguments
的變化:
很明顯這個 window.byted_acrawler(window.sign())
應該就是生成 _signature
的語句,這個方法和某位元組系的 _signature
生成的方法名稱是一樣的,直接在控制檯輸出一下可以拿到值,其中 window.sign()
是取的時間戳:
我們前面猜測是 MD5,直接驗證一下,發現並不是的,即便是同一個時間戳,經過 window.byted_acrawler()
後得到的值每次也都不一樣:
Hook 關鍵方法
經過前面的分析,既然標準的 MD5 不行,那有沒有可能是魔改的 MD5 呢?首先找個 JavaScript 標準的 MD5 程式碼看一下,比如:http://pajhome.org.uk/crypt/m...
可以注意到,原始碼裡面有很多 md5_ff
、md5_gg
、md5_hh
、md5_ii
的方法,最後一個值都是固定的,那麼有沒有可能此題就是在標準 MD5 的基礎上修改了一些預設值呢?所以我們可以直接 Hook 這些關鍵方法,在控制檯輸出傳入的值,來一一對比一下,看看預設值是否是一樣的,為了方便觀察,我們還可以為輸出語句加上顏色,Hook 程式碼如下:
let oldFF = _[2][0]['md5_ff'];
let oldGG = _[2][0]['md5_gg'];
let oldHH = _[2][0]['md5_hh'];
let oldII = _[2][0]['md5_ii'];
let color_white_red = "color: white; background: red;"
let color_white_grey = "color: white; background: grey;"
let color_white_darkcyan = "color: white; background: darkcyan;"
let color_white_green = "color: white; background: green;"
let color_white_orange = "color: white; background: orange;"
_[2][0]['md5_ff'] = function (a, b, c, d, e, f, g) {
debugger;
let result = oldFF(a, b, c, d, e, f, g);
console.log("%c Function: %c md5_ff %c Result: %c %s %c Params: %c %s, %s, %s, %s, %s, %s, %s ", color_white_red, color_white_grey, color_white_red, color_white_grey, result, color_white_red, color_white_grey, a, b, c, d, e, f, g)
return result;
};
_[2][0]['md5_gg'] = function (a, b, c, d, e, f, g) {
debugger;
let result = oldGG(a, b, c, d, e, f, g);
console.log("%c Function: %c md5_gg %c Result: %c %s %c Params: %c %s, %s, %s, %s, %s, %s, %s ", color_white_red, color_white_darkcyan, color_white_red, color_white_darkcyan, result, color_white_red, color_white_darkcyan, a, b, c, d, e, f, g)
return result;
};
_[2][0]['md5_hh'] = function (a, b, c, d, e, f, g) {
debugger;
let result = oldHH(a, b, c, d, e, f, g);
console.log("%c Function: %c md5_hh %c Result: %c %s %c Params: %c %s, %s, %s, %s, %s, %s, %s ", color_white_red, color_white_green, color_white_red, color_white_green, result, color_white_red, color_white_green, a, b, c, d, e, f, g)
return result;
};
_[2][0]['md5_ii'] = function (a, b, c, d, e, f, g) {
debugger;
let result = oldII(a, b, c, d, e, f, g);
console.log("%c Function: %c md5_ii %c Result: %c %s %c Params: %c %s, %s, %s, %s, %s, %s, %s ", color_white_red, color_white_orange, color_white_red, color_white_orange, result, color_white_red, color_white_orange, a, b, c, d, e, f, g)
return result;
};
Hook 程式碼寫得比較死板,熟悉 JS 的大佬可自己優化一下,注意注入程式碼的時機,清除定時器後,斷點執行到 y__()
方法後再注入,然後取消斷點,一直下一步,就可以在控制檯看到輸出的引數了,如下圖所示:
與預設引數進行對比,可以發現 md5_hh()
裡有兩個預設引數被修改了:
預設的 -722521979
改成了 -722521939
、76029189
改成了 76029185
,原生程式碼修改一下即可:
/* ==================================
# @Time : 2021-12-23
# @Author : 微信公眾號:K哥爬蟲
# @FileName: challenge_7.js
# @Software: PyCharm
# ================================== */
/*
* A JavaScript implementation of the RSA Data Security, Inc. MD5 Message
* Digest Algorithm, as defined in RFC 1321.
* Version 2.2 Copyright (C) Paul Johnston 1999 - 2009
* Other contributors: Greg Holt, Andrew Kepert, Ydnar, Lostinet
* Distributed under the BSD License
* See http://pajhome.org.uk/crypt/md5 for more info.
*/
/*
* Configurable variables. You may need to tweak these to be compatible with
* the server-side, but the defaults work in most cases.
*/
var hexcase = 0; /* hex output format. 0 - lowercase; 1 - uppercase */
var b64pad = ""; /* base-64 pad character. "=" for strict RFC compliance */
/*
* These are the functions you'll usually want to call
* They take string arguments and return either hex or base-64 encoded strings
*/
function hex_md5(s) { return rstr2hex(rstr_md5(str2rstr_utf8(s))); }
function b64_md5(s) { return rstr2b64(rstr_md5(str2rstr_utf8(s))); }
function any_md5(s, e) { return rstr2any(rstr_md5(str2rstr_utf8(s)), e); }
function hex_hmac_md5(k, d)
{ return rstr2hex(rstr_hmac_md5(str2rstr_utf8(k), str2rstr_utf8(d))); }
function b64_hmac_md5(k, d)
{ return rstr2b64(rstr_hmac_md5(str2rstr_utf8(k), str2rstr_utf8(d))); }
function any_hmac_md5(k, d, e)
{ return rstr2any(rstr_hmac_md5(str2rstr_utf8(k), str2rstr_utf8(d)), e); }
/*
* Perform a simple self-test to see if the VM is working
*/
function md5_vm_test()
{
return hex_md5("abc").toLowerCase() == "900150983cd24fb0d6963f7d28e17f72";
}
/*
* Calculate the MD5 of a raw string
*/
function rstr_md5(s)
{
return binl2rstr(binl_md5(rstr2binl(s), s.length * 8));
}
/*
* Calculate the HMAC-MD5, of a key and some data (raw strings)
*/
function rstr_hmac_md5(key, data)
{
var bkey = rstr2binl(key);
if(bkey.length > 16) bkey = binl_md5(bkey, key.length * 8);
var ipad = Array(16), opad = Array(16);
for(var i = 0; i < 16; i++)
{
ipad[i] = bkey[i] ^ 0x36363636;
opad[i] = bkey[i] ^ 0x5C5C5C5C;
}
var hash = binl_md5(ipad.concat(rstr2binl(data)), 512 + data.length * 8);
return binl2rstr(binl_md5(opad.concat(hash), 512 + 128));
}
/*
* Convert a raw string to a hex string
*/
function rstr2hex(input)
{
try { hexcase } catch(e) { hexcase=0; }
var hex_tab = hexcase ? "0123456789ABCDEF" : "0123456789abcdef";
var output = "";
var x;
for(var i = 0; i < input.length; i++)
{
x = input.charCodeAt(i);
output += hex_tab.charAt((x >>> 4) & 0x0F)
+ hex_tab.charAt( x & 0x0F);
}
return output;
}
/*
* Convert a raw string to a base-64 string
*/
function rstr2b64(input)
{
try { b64pad } catch(e) { b64pad=''; }
var tab = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
var output = "";
var len = input.length;
for(var i = 0; i < len; i += 3)
{
var triplet = (input.charCodeAt(i) << 16)
| (i + 1 < len ? input.charCodeAt(i+1) << 8 : 0)
| (i + 2 < len ? input.charCodeAt(i+2) : 0);
for(var j = 0; j < 4; j++)
{
if(i * 8 + j * 6 > input.length * 8) output += b64pad;
else output += tab.charAt((triplet >>> 6*(3-j)) & 0x3F);
}
}
return output;
}
/*
* Convert a raw string to an arbitrary string encoding
*/
function rstr2any(input, encoding)
{
var divisor = encoding.length;
var i, j, q, x, quotient;
/* Convert to an array of 16-bit big-endian values, forming the dividend */
var dividend = Array(Math.ceil(input.length / 2));
for(i = 0; i < dividend.length; i++)
{
dividend[i] = (input.charCodeAt(i * 2) << 8) | input.charCodeAt(i * 2 + 1);
}
/*
* Repeatedly perform a long division. The binary array forms the dividend,
* the length of the encoding is the divisor. Once computed, the quotient
* forms the dividend for the next step. All remainders are stored for later
* use.
*/
var full_length = Math.ceil(input.length * 8 /
(Math.log(encoding.length) / Math.log(2)));
var remainders = Array(full_length);
for(j = 0; j < full_length; j++)
{
quotient = Array();
x = 0;
for(i = 0; i < dividend.length; i++)
{
x = (x << 16) + dividend[i];
q = Math.floor(x / divisor);
x -= q * divisor;
if(quotient.length > 0 || q > 0)
quotient[quotient.length] = q;
}
remainders[j] = x;
dividend = quotient;
}
/* Convert the remainders to the output string */
var output = "";
for(i = remainders.length - 1; i >= 0; i--)
output += encoding.charAt(remainders[i]);
return output;
}
/*
* Encode a string as utf-8.
* For efficiency, this assumes the input is valid utf-16.
*/
function str2rstr_utf8(input)
{
var output = "";
var i = -1;
var x, y;
while(++i < input.length)
{
/* Decode utf-16 surrogate pairs */
x = input.charCodeAt(i);
y = i + 1 < input.length ? input.charCodeAt(i + 1) : 0;
if(0xD800 <= x && x <= 0xDBFF && 0xDC00 <= y && y <= 0xDFFF)
{
x = 0x10000 + ((x & 0x03FF) << 10) + (y & 0x03FF);
i++;
}
/* Encode output as utf-8 */
if(x <= 0x7F)
output += String.fromCharCode(x);
else if(x <= 0x7FF)
output += String.fromCharCode(0xC0 | ((x >>> 6 ) & 0x1F),
0x80 | ( x & 0x3F));
else if(x <= 0xFFFF)
output += String.fromCharCode(0xE0 | ((x >>> 12) & 0x0F),
0x80 | ((x >>> 6 ) & 0x3F),
0x80 | ( x & 0x3F));
else if(x <= 0x1FFFFF)
output += String.fromCharCode(0xF0 | ((x >>> 18) & 0x07),
0x80 | ((x >>> 12) & 0x3F),
0x80 | ((x >>> 6 ) & 0x3F),
0x80 | ( x & 0x3F));
}
return output;
}
/*
* Encode a string as utf-16
*/
function str2rstr_utf16le(input)
{
var output = "";
for(var i = 0; i < input.length; i++)
output += String.fromCharCode( input.charCodeAt(i) & 0xFF,
(input.charCodeAt(i) >>> 8) & 0xFF);
return output;
}
function str2rstr_utf16be(input)
{
var output = "";
for(var i = 0; i < input.length; i++)
output += String.fromCharCode((input.charCodeAt(i) >>> 8) & 0xFF,
input.charCodeAt(i) & 0xFF);
return output;
}
/*
* Convert a raw string to an array of little-endian words
* Characters >255 have their high-byte silently ignored.
*/
function rstr2binl(input)
{
var output = Array(input.length >> 2);
for(var i = 0; i < output.length; i++)
output[i] = 0;
for(var i = 0; i < input.length * 8; i += 8)
output[i>>5] |= (input.charCodeAt(i / 8) & 0xFF) << (i%32);
return output;
}
/*
* Convert an array of little-endian words to a string
*/
function binl2rstr(input)
{
var output = "";
for(var i = 0; i < input.length * 32; i += 8)
output += String.fromCharCode((input[i>>5] >>> (i % 32)) & 0xFF);
return output;
}
/*
* Calculate the MD5 of an array of little-endian words, and a bit length.
*/
function binl_md5(x, len)
{
/* append padding */
x[len >> 5] |= 0x80 << ((len) % 32);
x[(((len + 64) >>> 9) << 4) + 14] = len;
var a = 1732584193;
var b = -271733879;
var c = -1732584194;
var d = 271733878;
for(var i = 0; i < x.length; i += 16)
{
var olda = a;
var oldb = b;
var oldc = c;
var oldd = d;
a = md5_ff(a, b, c, d, x[i+ 0], 7 , -680876936);
d = md5_ff(d, a, b, c, x[i+ 1], 12, -389564586);
c = md5_ff(c, d, a, b, x[i+ 2], 17, 606105819);
b = md5_ff(b, c, d, a, x[i+ 3], 22, -1044525330);
a = md5_ff(a, b, c, d, x[i+ 4], 7 , -176418897);
d = md5_ff(d, a, b, c, x[i+ 5], 12, 1200080426);
c = md5_ff(c, d, a, b, x[i+ 6], 17, -1473231341);
b = md5_ff(b, c, d, a, x[i+ 7], 22, -45705983);
a = md5_ff(a, b, c, d, x[i+ 8], 7 , 1770035416);
d = md5_ff(d, a, b, c, x[i+ 9], 12, -1958414417);
c = md5_ff(c, d, a, b, x[i+10], 17, -42063);
b = md5_ff(b, c, d, a, x[i+11], 22, -1990404162);
a = md5_ff(a, b, c, d, x[i+12], 7 , 1804603682);
d = md5_ff(d, a, b, c, x[i+13], 12, -40341101);
c = md5_ff(c, d, a, b, x[i+14], 17, -1502002290);
b = md5_ff(b, c, d, a, x[i+15], 22, 1236535329);
a = md5_gg(a, b, c, d, x[i+ 1], 5 , -165796510);
d = md5_gg(d, a, b, c, x[i+ 6], 9 , -1069501632);
c = md5_gg(c, d, a, b, x[i+11], 14, 643717713);
b = md5_gg(b, c, d, a, x[i+ 0], 20, -373897302);
a = md5_gg(a, b, c, d, x[i+ 5], 5 , -701558691);
d = md5_gg(d, a, b, c, x[i+10], 9 , 38016083);
c = md5_gg(c, d, a, b, x[i+15], 14, -660478335);
b = md5_gg(b, c, d, a, x[i+ 4], 20, -405537848);
a = md5_gg(a, b, c, d, x[i+ 9], 5 , 568446438);
d = md5_gg(d, a, b, c, x[i+14], 9 , -1019803690);
c = md5_gg(c, d, a, b, x[i+ 3], 14, -187363961);
b = md5_gg(b, c, d, a, x[i+ 8], 20, 1163531501);
a = md5_gg(a, b, c, d, x[i+13], 5 , -1444681467);
d = md5_gg(d, a, b, c, x[i+ 2], 9 , -51403784);
c = md5_gg(c, d, a, b, x[i+ 7], 14, 1735328473);
b = md5_gg(b, c, d, a, x[i+12], 20, -1926607734);
a = md5_hh(a, b, c, d, x[i+ 5], 4 , -378558);
d = md5_hh(d, a, b, c, x[i+ 8], 11, -2022574463);
c = md5_hh(c, d, a, b, x[i+11], 16, 1839030562);
b = md5_hh(b, c, d, a, x[i+14], 23, -35309556);
a = md5_hh(a, b, c, d, x[i+ 1], 4 , -1530992060);
d = md5_hh(d, a, b, c, x[i+ 4], 11, 1272893353);
c = md5_hh(c, d, a, b, x[i+ 7], 16, -155497632);
b = md5_hh(b, c, d, a, x[i+10], 23, -1094730640);
a = md5_hh(a, b, c, d, x[i+13], 4 , 681279174);
d = md5_hh(d, a, b, c, x[i+ 0], 11, -358537222);
// 註釋掉的是預設值
// c = md5_hh(c, d, a, b, x[i+ 3], 16, -722521979);
c = md5_hh(c, d, a, b, x[i+ 3], 16, -722521939);
// b = md5_hh(b, c, d, a, x[i+ 6], 23, 76029189);
b = md5_hh(b, c, d, a, x[i+ 6], 23, 76029185);
a = md5_hh(a, b, c, d, x[i+ 9], 4 , -640364487);
d = md5_hh(d, a, b, c, x[i+12], 11, -421815835);
c = md5_hh(c, d, a, b, x[i+15], 16, 530742520);
b = md5_hh(b, c, d, a, x[i+ 2], 23, -995338651);
a = md5_ii(a, b, c, d, x[i+ 0], 6 , -198630844);
d = md5_ii(d, a, b, c, x[i+ 7], 10, 1126891415);
c = md5_ii(c, d, a, b, x[i+14], 15, -1416354905);
b = md5_ii(b, c, d, a, x[i+ 5], 21, -57434055);
a = md5_ii(a, b, c, d, x[i+12], 6 , 1700485571);
d = md5_ii(d, a, b, c, x[i+ 3], 10, -1894986606);
c = md5_ii(c, d, a, b, x[i+10], 15, -1051523);
b = md5_ii(b, c, d, a, x[i+ 1], 21, -2054922799);
a = md5_ii(a, b, c, d, x[i+ 8], 6 , 1873313359);
d = md5_ii(d, a, b, c, x[i+15], 10, -30611744);
c = md5_ii(c, d, a, b, x[i+ 6], 15, -1560198380);
b = md5_ii(b, c, d, a, x[i+13], 21, 1309151649);
a = md5_ii(a, b, c, d, x[i+ 4], 6 , -145523070);
d = md5_ii(d, a, b, c, x[i+11], 10, -1120210379);
c = md5_ii(c, d, a, b, x[i+ 2], 15, 718787259);
b = md5_ii(b, c, d, a, x[i+ 9], 21, -343485551);
a = safe_add(a, olda);
b = safe_add(b, oldb);
c = safe_add(c, oldc);
d = safe_add(d, oldd);
}
return Array(a, b, c, d);
}
/*
* These functions implement the four basic operations the algorithm uses.
*/
function md5_cmn(q, a, b, x, s, t)
{
return safe_add(bit_rol(safe_add(safe_add(a, q), safe_add(x, t)), s),b);
}
function md5_ff(a, b, c, d, x, s, t)
{
return md5_cmn((b & c) | ((~b) & d), a, b, x, s, t);
}
function md5_gg(a, b, c, d, x, s, t)
{
return md5_cmn((b & d) | (c & (~d)), a, b, x, s, t);
}
function md5_hh(a, b, c, d, x, s, t)
{
return md5_cmn(b ^ c ^ d, a, b, x, s, t);
}
function md5_ii(a, b, c, d, x, s, t)
{
return md5_cmn(c ^ (b | (~d)), a, b, x, s, t);
}
/*
* Add integers, wrapping at 2^32. This uses 16-bit operations internally
* to work around bugs in some JS interpreters.
*/
function safe_add(x, y)
{
var lsw = (x & 0xFFFF) + (y & 0xFFFF);
var msw = (x >> 16) + (y >> 16) + (lsw >> 16);
return (msw << 16) | (lsw & 0xFFFF);
}
/*
* Bitwise rotate a 32-bit number to the left.
*/
function bit_rol(num, cnt)
{
return (num << cnt) | (num >>> (32 - cnt));
}
function getSignature() {
return hex_md5(Date.parse(Date()).toString())
}
console.log(getSignature())
Python 呼叫程式碼:
# ==================================
# --*-- coding: utf-8 --*--
# @Time : 2021-12-23
# @Author : 微信公眾號:K哥爬蟲
# @FileName: challenge_7.py
# @Software: PyCharm
# ==================================
import time
import execjs
import requests
challenge_api = "http://spider.wangluozhe.com/challenge/api/7"
headers = {
"Cookie": "Cookie 替換成你的",
"Host": "spider.wangluozhe.com",
"Origin": "http://spider.wangluozhe.com",
"Referer": "http://spider.wangluozhe.com/challenge/7",
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36",
"X-Requested-With": "XMLHttpRequest"
}
def get_signature():
now = str(int(time.time())) + "000"
with open('challenge_7.js', 'r', encoding='utf-8') as f:
wlz_js = execjs.compile(f.read())
# signature = wlz_js.call("getSignature")
signature = wlz_js.call("hex_md5", now)
print("signature: ", signature)
return signature
def main():
result = 0
for page in range(1, 101):
data = {
"page": page,
"count": 10,
"_signature": get_signature()
}
response = requests.post(url=challenge_api, headers=headers, data=data).json()
print(response)
for d in response["data"]:
result += d["value"]
print("結果為: ", result)
if __name__ == '__main__':
main()
這裡還有一點小細節,如果是 Python 生成時間戳傳入 JS 的 hex_md5
方法的話,要保證時間戳的最後三位為0,不然校驗通不過,通常的寫法是 str(int(time.time() * 1000))
,這裡要改一下:str(int(time.time())) + "000"
,不用 Python 的話,也可以在 JS 裡寫個方法直接返回 hex_md5(Date.parse(Date()).toString())
也行。
還有一個問題就是如果你找的 MD5 程式碼不規範,準確來說是和題目使用的 MD5 程式碼不太一樣的話,有可能本地要改的地方就不止這兩處了,所以儘量找一個方法名都一樣的JS,能省不少事兒。
日誌斷點 / 插樁除錯
除了 Hook 以外,我們還可以通過插樁除錯的方式,將整個生成 _signature
的流程、涉及到的引數、生成的值,都通過日誌的形式列印出來,逆向分析其邏輯。PS:插樁,即日誌斷點,滑鼠右鍵選擇 Add logpoint
即可新增一個日誌斷點,相當於 console.log()
,此功能是 Chrome 73 版本新增的。
- Add breakpoint:新增普通斷點;
- Add conditional breakpoint:新增條件斷點,滿足條件才斷下;
- Add logpoint:新增日誌斷點;
- Never pause here:永不在此處斷下;
- Add script to ignore list:網站的部分 JS,比如
jquery.min.js
之類的庫檔案,我們單步除錯的時候並不想進入到該檔案中,那麼可以將此類檔案右鍵新增忽略掉。
關鍵的日誌斷點有以下三處:
- 第 605 行,
arguments
為當前傳入函式的引數值; - 第 141 行,
___.join(vV_)
為當前呼叫的方法名稱,也會輸出方法中的引數名稱; - 第 591 行,
__V(_, ___(u_), 0, 0, _U__).apply(void 0, y__(v___))
為當前方法執行完畢的結果。
肯定有人會疑惑,如何知道應該在這三個地方下日誌斷點呢?答案是隻能自己單步、多步除錯,找規律、仔細觀察,就像交流群裡的小小白大佬說的一樣,屁股坐爛就行了。當然也不是隻有這三個地方能輸出對應的資訊,有可能其他地方也可以,這就要看你自己除錯了。
除了這三個地方的日誌斷點以外,建議還可以在第 606 行打個斷點,這樣每次執行一個方法就斷下,本地就可以跟著同步除錯,挨個對比傳入的引數和得到的結果,不至於一下子輸出的東西太多,不方便查詢。
第一步,gnature = window.byted_acrawler(window.sign())
:
下一步,sign 方法,取時間戳:
下一步,呼叫 hex_md5()
方法:
從這裡就可以開始本地同步除錯了,本地 MD5 下斷點除錯,可以看到得到的值不一樣:
下一步,呼叫 str2binl()
方法,和本地得到的值是一樣的:
下一步,呼叫 core_md5()
方法,得到的值和本地就不一樣了,這裡大致可以確定此方法內部與標準演算法有差別了:
下一步,呼叫 md5_ff()
方法,得到的值是一樣的:
以此類推,最終會找到兩個不一樣的地方,即 md5_hh()
兩個預設引數被修改了。
-722521979
被改成了 -722521939
:
76029189
被改成了 76029185
:
最終提交結果,驗證成功: