Featured image of post ARKM前端逆向

ARKM前端逆向

ARKM平台前端逆向

1.随便找个包,发现headers中携带X-Payload参数,堆栈点一点,找到加密位置

097f21372cda45b9b04bfe4364917d8b

2.控制台打印获取a.ClientKey

05785df35119761a009ecdcdac63c768

3.Python编写加密函数

import requests
import time
import hashlib
import json
query = "bybit"
salt = "gh67j345kl"
def make_payload(path: str, ts: str) -> str:
    """复现 JS 里的两段 sha256 逻辑"""
    step1 = hashlib.sha256(f"{path}:{ts}:{salt}".encode()).hexdigest()
    return hashlib.sha256(f"{salt}:{step1}".encode()).hexdigest()

path = "/transfers"
ts = str(int(time.time()))
payload = make_payload(path, ts)
# 1. 构造与浏览器一致的请求头
headers = {
    "accept": "application/json, text/plain, */*",
    "accept-encoding": "gzip, deflate, br, zstd",
    "accept-language": "zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6",
    "origin": "https://intel.arkm.com",
    "referer": "https://intel.arkm.com/",
    "sec-ch-ua": '"Chromium";v="142", "Microsoft Edge";v="142", "Not_A Brand";v="99"',
    "sec-ch-ua-mobile": "?0",
    "sec-ch-ua-platform": '"Windows"',
    "sec-fetch-dest": "empty",
    "sec-fetch-mode": "cors",
    "sec-fetch-site": "same-site",
    "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 "
                  "(KHTML, like Gecko) Chrome/142.0.0.0 Safari/537.36 Edg/142.0.0.0",
    "x-timestamp": ts,
    "x-payload": payload,
        "cookie": "_ga=GA1.1.1952893755.1763016182; _fbp=fb.1.1763016181936.907337779104231599; _clck=1erlme0%5E2%5Eg0z%5E0%5E2143; mp_db580d24fbe794a9a4765D"
}

# 3. 发起请求
url = f"https://api.arkm.com{path}"
resp = requests.get(url, headers=headers, timeout=10)
print(json.dumps(resp.json(), ensure_ascii=False, indent=2))

4.获取完整的项目方关联地址,参与到后续区块扫描流程

使用 Hugo 构建
主题 StackJimmy 设计