当前位置:网站首页>Analysis of a video website m3u8 non perceptual encryption
Analysis of a video website m3u8 non perceptual encryption
2022-06-25 08:43:00 【Yuying】
A video website m3u8 Non perceptual encryption analysis
Sample address :aHR0cHM6Ly92LnFxLmNvbS94L2NvdmVyL216YzAwMjAwMXB2eHd6eS9pMDAzM2NncjF2bi5odG1s
After opening the website , Right click on the playback interface , Click on 【 Video information 】

You can see , Here, the encryption type of the video is 【CHACHA】, Follow the original method to find m3u8

Strange , here m3u8 Obviously not. key The logo of , But why does it show DRM Well ? No matter how much , Try downloading directly .
Sure enough , Whatever you use m3u8 Downloader , After downloading, either the video disappears or an error is reported , It shows that there is encryption , But you can play it on the web , The decryption method must be in the web page .
After preliminary analysis, it is found that , Things are not as simple as they think , The decryption process is put in wasm in , Then follow the previous wasm Experience of relevant articles , To analyze this wasm, The first wasm Download to local , And then convert to .o For documents IDA see

Decryption is one of 【h】 Method , This method is preceded by memory related instructions ,
边栏推荐
- 声纹技术(六):声纹技术的其他应用
- LVS-DR模式多网段案例
- 紧急行政中止令下达 Juul暂时可以继续在美国销售电子烟产品
- How to calculate the characteristic vector, weight value, CI value and other indicators in AHP?
- Unity addressable batch management
- C language "Recursion Series": recursively realizing the n-th power of X
- 打新债的安全性 有风险吗
- How to calculate the positive and negative ideal solution and the positive and negative ideal distance in TOPSIS method?
- LVS-DR模式单网段案例
- Unity Addressable批量管理
猜你喜欢

检测点是否在多边形内

Similarity calculation method

What are the indicators of VIKOR compromise?

如何设计测试用例

Nips 2014 | two stream revolutionary networks for action recognition in videos reading notes

A 35 year old Tencent employee was laid off and sighed: a suite in Beijing, with a deposit of more than 7 million, was anxious about unemployment

【操作教程】TSINGSEE青犀视频平台如何将旧数据库导入到新数据库?

【515. 在每个树行中找最大值】

Beam search and five optimization methods

Getting to know the generation confrontation network (11) -- using pytoch to build wgan to generate handwritten digits
随机推荐
Scanpy (VII) spatial data analysis based on scanorama integrated scrna seq
配置、软件配置项、软件配置管理项辨析
Can I grant database tables permission to delete column objects? Why?
堆栈认知——栈溢出实例(ret2libc)
Unity Addressable批量管理
leetcode. 13 --- Roman numeral to integer
2021 "Ai China" selection
Scanpy(七)基于scanorama整合scRNA-seq实现空间数据分析
How is the ISM model analyzed?
How to choose an account opening broker? Is it safe to open an account online?
Summary of NLP data enhancement methods
声纹技术(六):声纹技术的其他应用
In Section 5 of bramble pie project practice, Nokia 5110 LCD is used to display Hello World
各种同步学习笔记
RTOS 多线程下hardfault问题总结
Sampling strategy and decoding strategy based on seq2seq text generation
声纹技术(四):声纹识别的工程部署
TrendMicro:Apex One Server 工具文件夹
Is there no risk in the security of new bonds
GIL问题带来的问题,解决方法