interface to be extracted when doing key4wifi
Some of the code comes from
http://zke1ev3n.me/2016/04/06/WiFi%E4%B8%87%E8%83%BD%E9%92%A5%E5%8C%99%E6%8E%A5%E5%8F%A3%E5%8D%8F%E8%AE%AE%E7% a0%b4%e8%a7%a3/
Main ideas:
1. Build a true JSON of request data
2. aes/cbc/nopadding encryption after compressing the request data via gzip
3. Place the encrypted request data in the HTTP request data, attach other data such as the request type, and then perform a MD5 signature
When the original decryption of the data was wrong, and then went back to find several times code discovery and gzip encryption ....
And then tangled up all day to find out how still wrong, found the code in the encryption key was I copy paste less an exclamation point .... Damn retarded.
As for the part that takes Dhid ..... Cough cough, too lazy to find, with a relatively old version of a fixed encrypted packet (100,000 tests down no problem)
The code is so long, it's too lazy to post it
Http://files.cnblogs.com/files/loyieking/WiFiMasterKey.zip
In addition, as far as I know, the latest version of the WiFi master key has been replaced by the encryption method, and this time has been encrypted with the shell to write dead ... Not only that, so inside seems to also have self-contained anti-debug module ... And so the tentacles to crack it, I am really ignorant of this piece ...
WiFi Universal Key 4.1.32 interface