zoukankan      html  css  js  c++  java
  • fiddler中的HexView的16进制数据转明文

     在用Fiddler抓包的时候,遇到这种包类型.里面的数据是乱码的.这样改怎么查看原文呢.

    Content-Disposition: form-data; name=xDeviceInfo
    Content-Type: application/octet-stream
    Content-Length: 241

    Raw的数据是

    POST http://hsa.m.800best.com/hsaapi/v1/RealNameService/SubmitRealNameCustomerReceiveInfo HTTP/1.1
    X-Auth-Site: 327232
    X-Auth-User: 327232.002
    X-Auth-Token: ed56d35f-0e63-482e-852e-42ab68070290
    X-ClientVersion: 670
    X-ClientTime: 2020-06-05T14:11:36.409+08:00
    X-SerializationType: json
    X-Sequence: f704f9dc-0b68-44b6-8ef5-247d62354038
    X-SystemType: android
    X-PackageName: com.best.android.hsandroid
    X-SystemVersion: 24
    X-AppVersion: 670
    X-CompressType: gzip
    Content-Type: multipart/form-data; boundary=c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Length: 1669
    Host: hsa.m.800best.com
    Connection: Keep-Alive
    Accept-Encoding: gzip
    User-Agent: okhttp/3.10.0
    
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=xDeviceInfo
    Content-Type: application/octet-stream
    Content-Length: 241
    
            m  n  D  g   `   U{j/  nT  EU   H9  ff    5 
     =w h  R } w~ y y;F79  K  =  |N  a  kps ?       PH  Z Oa  3i
    8
    ; a  -   _  *
       P  9 $  fh   =z^+ B   TOq'  " A*5y  Ȃ n K 8n      ]> ZB 6 ^?  p    3<l Y  
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=xLocation
    Content-Type: application/octet-stream
    Content-Length: 74
    
             VJLN.-JL T 2 3 Q I, ,)MI q  ґ E e ) EJVJI  )   %@^- [ ˲H   
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=userName
    Content-Type: application/octet-stream
    Content-Length: 31
    
            Sz qճ}O ە     
       
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=siteCode
    Content-Type: application/octet-stream
    Content-Length: 28
    
            S262726R ˹VY   
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=clientTime
    Content-Type: application/octet-stream
    Content-Length: 51
    
            S2202 50 50
    14 24 26 3   6  20P    D   
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123
    Content-Disposition: form-data; name=scanDataList
    Content-Type: application/octet-stream
    Content-Length: 284
    
               n 0E  k    . y+ B  D , 2# ͐          D   f` Vl y uJAb   
    { I  z   sl    ]R F ܛJ P Z"Gp  R?  j e ~  ʲ͛R<a# 5:   %Y˲ 5 U) h "  A6l     <2 C  PG   Y` TM[e +V|ܧ u4 q ;F t 4c   Ma " p> w /e 3
     G K` M @  _  /     o  lwi4    s  O   
    --c94e71d4-0cbd-47d9-8e68-8f1c07465123--

    从请求头里可以看到是Accept-Encoding: gzip

    这样的话需要在HexView里复制相应的16进制源数据,然后进行Gzip解压

    找到相对应的数据,根据经验可得

    16进制的0D 0A 对应的字符串其实是 ,那么就从0D0A开始,一直到下个0D0A结束,这个就是压缩过的数据,然后复制这串数据

     把这串数据放到下面的代码里,然后用python执行即可

    复制出来是这样的一串代码

    byte[] arrOutput = { 0x1F, 0x8B, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x6D, 0x90, 0xC1, 0x6E, 0xC3, 0x20, 0x10, 0x44, 0xFF, 0xC5, 0x67, 0xAB, 0xDA, 0xC5, 0x60, 0xA0, 0xB7, 0xAA, 0x55, 0x7B, 0x6A, 0x2F, 0xFD, 0x02, 0xF0, 0x6E, 0x14, 0x54, 0x03, 0x96, 0xB1, 0x13, 0x45, 0x55, 0xFF, 0xBD, 0x90, 0x48, 0x39, 0xE5, 0xB8, 0xF3, 0x66, 0x66, 0xA5, 0xF9, 0xED, 0x5C, 0xA2, 0x35, 0x07, 0x0A, 0xD4, 0x3D, 0x77, 0xD3, 0x68, 0xB5, 0xF1, 0x80, 0x93, 0x52, 0x86, 0x08, 0x7D, 0xD7, 0x77, 0x7E, 0xDE, 0x79, 0xCB, 0x79, 0x3B, 0x46, 0x37, 0x39, 0xA2, 0x95, 0x4B, 0xA9, 0xC6, 0x3D, 0xFD, 0xA4, 0x7C, 0x4E, 0x8D, 0xEF, 0x61, 0xA6, 0xC2, 0x6B, 0x70, 0x73, 0xD5, 0x3F, 0xDF, 0xC5, 0xEB, 0x07, 0xA0, 0xB5, 0x02, 0xDE, 0x50, 0x48, 0x8D, 0xAA, 0x5A, 0x88, 0x4F, 0x61, 0xE2, 0xEB, 0x03, 0x33, 0x1A, 0x69, 0x0D, 0x08, 0x14, 0x38, 0x0A, 0x3B, 0xDC, 0x61, 0xCC, 0xC4, 0x2D, 0xEF, 0xE6, 0xA5, 0xF4, 0x5F, 0xE2, 0x1B, 0x00, 0x2A, 0x0B, 0x91, 0xC3, 0xC3, 0x50, 0x88, 0xA5, 0x01, 0x39, 0x02, 0x8C, 0x12, 0x24, 0xA2, 0xB2, 0x66, 0x68, 0x89, 0xE5, 0x98, 0x13, 0xA7, 0x3D, 0x7A, 0x5E, 0x2B, 0xAF, 0x42, 0xB9, 0xF5, 0x97, 0x54, 0x4F, 0x71, 0x18, 0x27, 0xEB, 0xC8, 0x22, 0xF8, 0x41, 0x2A, 0x05, 0x16, 0x35, 0x79, 0xE3, 0x85, 0xF6, 0xC8, 0x82, 0xB5, 0x6E, 0xF6, 0x4B, 0xD9, 0x38, 0x6E, 0x97, 0x85, 0xAB, 0xFF, 0xE5, 0xB6, 0xCC, 0x5D, 0x3E, 0xF1, 0x5A, 0x42, 0xBE, 0x36, 0xC9, 0x5E, 0x3F, 0xB5, 0x7F, 0xE7, 0x70, 0x08, 0x0F, 0x87, 0xF9, 0xFB, 0x07, 0x33, 0x3C, 0x6C, 0xB1, 0x59, 0x01, 0x00, 0x00 };

    我们把{}前后的代码去掉,然后把这串字符串复制到下面的代码里,运行即可

    代码

    import gzip
    
    
    hex_list = [0x1F, 0x8B, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x6D, 0x90, 0xC1, 0x6E, 0xC3, 0x20, 0x10,
                0x44, 0xFF, 0xC5, 0x67, 0xAB, 0xDA, 0xC5, 0x60, 0xA0, 0xB7, 0xAA, 0x55, 0x7B, 0x6A, 0x2F, 0xFD, 0x02,
                0xF0, 0x6E, 0x14, 0x54, 0x03, 0x96, 0xB1, 0x13, 0x45, 0x55, 0xFF, 0xBD, 0x90, 0x48, 0x39, 0xE5, 0xB8,
                0xF3, 0x66, 0x66, 0xA5, 0xF9, 0xED, 0x5C, 0xA2, 0x35, 0x07, 0x0A, 0xD4, 0x3D, 0x77, 0xD3, 0x68, 0xB5,
                0xF1, 0x80, 0x93, 0x52, 0x86, 0x08, 0x7D, 0xD7, 0x77, 0x7E, 0xDE, 0x79, 0xCB, 0x79, 0x3B, 0x46, 0x37,
                0x39, 0xA2, 0x95, 0x4B, 0xA9, 0xC6, 0x3D, 0xFD, 0xA4, 0x7C, 0x4E, 0x8D, 0xEF, 0x61, 0xA6, 0xC2, 0x6B,
                0x70, 0x73, 0xD5, 0x3F, 0xDF, 0xC5, 0xEB, 0x07, 0xA0, 0xB5, 0x02, 0xDE, 0x50, 0x48, 0x8D, 0xAA, 0x5A,
                0x88, 0x4F, 0x61, 0xE2, 0xEB, 0x03, 0x33, 0x1A, 0x69, 0x0D, 0x08, 0x14, 0x38, 0x0A, 0x3B, 0xDC, 0x61,
                0xCC, 0xC4, 0x2D, 0xEF, 0xE6, 0xA5, 0xF4, 0x5F, 0xE2, 0x1B, 0x00, 0x2A, 0x0B, 0x91, 0xC3, 0xC3, 0x50,
                0x88, 0xA5, 0x01, 0x39, 0x02, 0x8C, 0x12, 0x24, 0xA2, 0xB2, 0x66, 0x68, 0x89, 0xE5, 0x98, 0x13, 0xA7,
                0x3D, 0x7A, 0x5E, 0x2B, 0xAF, 0x42, 0xB9, 0xF5, 0x97, 0x54, 0x4F, 0x71, 0x18, 0x27, 0xEB, 0xC8, 0x22,
                0xF8, 0x41, 0x2A, 0x05, 0x16, 0x35, 0x79, 0xE3, 0x85, 0xF6, 0xC8, 0x82, 0xB5, 0x6E, 0xF6, 0x4B, 0xD9,
                0x38, 0x6E, 0x97, 0x85, 0xAB, 0xFF, 0xE5, 0xB6, 0xCC, 0x5D, 0x3E, 0xF1, 0x5A, 0x42, 0xBE, 0x36, 0xC9,
                0x5E, 0x3F, 0xB5, 0x7F, 0xE7, 0x70, 0x08, 0x0F, 0x87, 0xF9, 0xFB, 0x07, 0x33, 0x3C, 0x6C, 0xB1, 0x59,
                0x01, 0x00, 0x00]
    b_bytes = bytes(hex_list)
    print(gzip.decompress(b_bytes).decode())
  • 相关阅读:
    Android游戏开发22:Android动画的实现J2me游戏类库用于Android开发
    android sqlite SQLiteDatabase 操作大全 不看后悔!必收藏!看后精通SQLITE (第三部分,完整代码)
    使用OGR创建dxf格式矢量数据
    mysql 数据库引擎 MyISAM InnoDB 大比拼 区别
    android sqlite SQLiteDatabase 操作大全 不看后悔!必收藏!看后精通SQLITE (第二部分)
    mysql 更改数据库引擎
    android sqlite SQLiteDatabase 操作大全 不看后悔!必收藏!看后精通SQLITE (第一部分)
    android 数字键盘使用
    MySQL Innodb数据库性能实践
    eclipse : Error while performing database login with the driver null
  • 原文地址:https://www.cnblogs.com/blog-rui/p/13070840.html
Copyright © 2011-2022 走看看