Skip to content

Commit 4cd5d83

Browse files
committed
doc: 优化图片
1 parent 4926366 commit 4cd5d83

File tree

6 files changed

+4
-4
lines changed

6 files changed

+4
-4
lines changed
Binary file not shown.
Binary file not shown.
Loading
Loading

docs/jsonp-request-encrypt/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
这个页面上点击"发送JSONP请求"按钮的时候,会向后端发送一个jsop的请求上报数据:
66

7-
![image-20250112002041376](README.assets/image-20250112002041376.png)
7+
![image-20250113031216910](./README.assets/image-20250113031216910.png)
88

99
但是上报的数据参数是加密的:
1010

@@ -50,9 +50,9 @@ https://github.com/JSREI/js-script-hook?tab=readme-ov-file#%E4%BA%8C%E5%AE%89%E8
5050

5151
![image-20250112020656925](README.assets/image-20250112020656925.png)
5252

53-
增加一个匹配所有URL的断点:
53+
增加一个匹配所有URL的断点,因为我们只关心请求参数上的加密,所以我们只需要开启请求断点就可以了
5454

55-
![image-20250112020725546](README.assets/image-20250112020725546.png)
55+
![image-20250113031507166](./README.assets/image-20250113031507166.png)
5656

5757
然后回到页面上点击“发送JSONP请求”按钮,发现进入了断点,从右侧的调用栈往前追溯:
5858

docs/jsonp-response-encrypt/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
# 一、逆向目标
44

5-
这个页面上点击"发送请求"按钮的时候,会从后端来气数据展示在右侧
5+
这个页面上点击"发送请求"按钮的时候,会从后端拉取数据展示在右侧
66

77
![image-20250112222146343](./README.assets/image-20250112222146343.png)
88

0 commit comments

Comments
 (0)