本帖最后由 mmortalyi 于 2023-12-23 22:57 编辑
软件直接拉到de4dot
然后dnspy打开
定位到登录 

Class55.string_3 字符串为网址
下方有登录返回的处理方法 

bool flag = Convert.ToInt32(jobject2["vip"]) == 1;
IP 为1就是会员
登录返回 sBovT8i0ltibhQbu/jhoHgL8wN9dLvB4nN9UU2nQ9VJVQs6w2NzYSZ2D8uhdCBS6szbFjKoyGQMpyK6+6+f5GO/W+sss50G880N68xQwhULH219wtntna/Yk3pSAILhf4eb/fBBdpVpa3q7wuCHOoBTDQQ2ZDlQYltSpcg3AmcDvcMknVZ+3s8zYYp2iY4AADljbOe9Dnrt9S1za/J5Y/g==
用AES解密 密钥3127890231dbcaef 偏移4687890231dbcaef {"email":"dslt@dslt.com","regTime":"2023/1/1 00:00:00","startTime":"2023/1/1 00:00:00","endTime":"2023/1/1 00:00:00","token":"123456789","vip":1,"ad":""}
明文了那就能操作的太多了..
修改判断==0
或者直接解密的json赋值给jobject2
或者打开https://echoserver.dev/写个响应
修改Class55.string_3的网址和/api/n-login.ashx 改拼接地址..
教程就到此结束了..
建议直接原版直接修改 避免有什么隐藏暗桩... 


注:若转载请注明大神论坛来源(本贴地址)与作者信息。
|