相信许多的小伙伴看到eval的加密过的代码就很懵了,明明知道这块是内容,但是无法读取出来,无从下手。当然了之所有要这样操作呢也是为了不让别人看到自己js里面的内容,所以做一个小小的加密。对于小白来说比较困难了,但是对于一个php站长来说那就是透明的,好了不多说今天蜀戎seo就告诉大家一个小方法分分钟破解eval(function(p,a,c,k,e,d){}))的JavaScript代码。
看演示代码:
eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new RegExp('\b'+e(c)+'\b','g'),k[c])}}return p}('d b=["3://1.0.2/6/5-4/e","3://1.0.2/6/5-4/9","3://1.0.2/6/5-4/7","3://1.0.2/6/5-4/a","3://1.0.2/6/5-4/8","3://1.0.2/6/5-4/c","3://1.0.2/6/5-4/m","3://1.0.2/6/5-4/k","3://1.0.2/6/5-4/l","3://1.0.2/6/5-4/f","3://1.0.2/6/5-4/i","3://1.0.2/6/5-4/g","3://1.0.2/6/5-4/h","3://1.0.2/6/5-4/j"]',23,23,'pstatp|p|com|https|image|pgc|origin|16617571d7524681883488b8cc5af731|d33c18ca0d0b4dc7bf6c71dfbb4e5103|05d817b698e442cc88c8963d54b83ee5|879ea1f96f0041ba8d31747ded3e38f1|newImgs|fac5f804f39e4a18af77a5c071fd36b1|var|571654a842e54b8ba8504bc4367c40f7|d390ba6a8188471eaaa00e9c28c91678|ab013bc69401497eb75e97e49f06082c|537ae593ed96452899cae414af43b6e2|ae22fc3d8be84a038384f74f5548b9eb|cb91195794a04d7aa3d1f911de68cf4c|dbf7a60ffece4407867de03f9af6b3f4|aa008c97bba74c32b2cfc6292c9d3848|e77db8c936164bea9b48d59ad136801f'.split('|'),0,{}))
操作步骤
打开浏览器控制台;
调到
Console
;复制代码,粘贴;
删除“
eval
”这四个字符;回车。
好了操作就结束了是不是很简单呢几乎一分钟不用,就可以知道这段内容是什么了。
解密后的代码:
var newImgs = ["https://p.pstatp.com/origin/pgc-image/571654a842e54b8ba8504bc4367c40f7", "https://p.pstatp.com/origin/pgc-image/05d817b698e442cc88c8963d54b83ee5", "https://p.pstatp.com/origin/pgc-image/16617571d7524681883488b8cc5af731", "https://p.pstatp.com/origin/pgc-image/879ea1f96f0041ba8d31747ded3e38f1", "https://p.pstatp.com/origin/pgc-image/d33c18ca0d0b4dc7bf6c71dfbb4e5103", "https://p.pstatp.com/origin/pgc-image/fac5f804f39e4a18af77a5c071fd36b1", "https://p.pstatp.com/origin/pgc-image/e77db8c936164bea9b48d59ad136801f", "https://p.pstatp.com/origin/pgc-image/dbf7a60ffece4407867de03f9af6b3f4", "https://p.pstatp.com/origin/pgc-image/aa008c97bba74c32b2cfc6292c9d3848", "https://p.pstatp.com/origin/pgc-image/d390ba6a8188471eaaa00e9c28c91678", "https://p.pstatp.com/origin/pgc-image/ae22fc3d8be84a038384f74f5548b9eb", "https://p.pstatp.com/origin/pgc-image/ab013bc69401497eb75e97e49f06082c", "https://p.pstatp.com/origin/pgc-image/537ae593ed96452899cae414af43b6e2", "https://p.pstatp.com/origin/pgc-image/cb91195794a04d7aa3d1f911de68cf4c"]
如还有不明白的欢迎下方留言,当然了这个也可以直接写成php插件在线解析,接入我们的网站里面或者火车头采集器里面等等。