|
另外,除了解码之后看到的APK内置连接请求URL链接,我还发现了很多其它有用的字符串:
- public static final String f5190a = ".ZIP"
- public static final String f5191b = ".DATA"
- public static final String f5192c = ".APK"
- public static final byte[] f5193d = "A".getBytes();
- public static final byte[] f5194e = "B".getBytes();
- public static final byte[] f5195f = "F".getBytes();
- public static final byte[] f5196g = "CCC".getBytes();
- public static final byte[] f5197h = "D".getBytes();
- public static final byte[] f5198i = "E".getBytes();
- public static final String f5199j = "HTTP://"
- public static final String f5200k = "TCP://";
- public static final String f5201l = "/APPS/d/p/OP.PHP"
- public static final String f5202m = "IP.TXT"
- private static Context f5203n = App.m7476a();
- private static String f5204o = "WWW.GLANCELOVE.COM"
- private static byte[] f5394b = "devId="
- private static byte[] f5395c = "&op="
- private static byte[] f5396d = "&fName="
- private static byte[] f5397e = "&data="
- private static String f5398f = "true"
从以上信息中可知,我可以利用参数 devId、op、fName和data来构造一个发往攻击控制服务器 (编辑:PHP编程网 - 湛江站长网)
【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!
|