抖音提取ttnetCookieStore.xml部分参数片段如下:
<string name="http://snssdk.com/|odin_tt">aced000573720031636f6d2e6279746564616e63652e6672616d65776f726b732e626173656c69622e6e6574776f726b2e687474702e622e6858765a0a7f563d0c0300014a00016378707400076f64696e5f74747400806162663762643132383666343137303631623636346364333664313662386635613232303532633739643464346662333563643361646561646337323037373135336335336532323036623437393530643836393566363162643764656630346337336636656466646633653336356530626235613666383164343433633163707074000b2e736e7373646b2e636f6d77080000000005265c007400012f70770f000000010000010000017a6585797578</string>
PHP解密函数:
function decode_cookie($str){
$length = strlen($str);
$newData = "";
$i = 0;
while($i<$length){
$newChar = (hexdec(substr($str,$i,1))<<4) + hexdec(substr($str,$i+1,1));
$newData = $newData.chr($newChar);
$i=$i+2;
}
return $newData;
}
解密后的内容: ��sr1com.bytedance.frameworks.baselib.network.http.b.hXvZ V= Jcxptodin_ttt�abf7bd1286f417061b664cd36d16b8f5a22052c79d4d4fb35cd3adeadc72077153c53e2206b47950d8695f61bd7def04c73f6edfdf3e365e0bb5a6f81d443c1cppt.snssdk.comw&\t/pwze�yux
其中有乱码因为使用了protobuff
abf7bd1286f417061b664cd36d16b8f5a22052c79d4d4fb35cd3adeadc72077153c53e2206b47950d8695f61bd7def04c73f6edfdf3e365e0bb5a6f81d443c1cppt
这部分就是我们需要的内容
|