分析流程:
App-Signature:
package com.p330tt.sdk.http.Interceptor;
/* renamed from: c */
public Map<String, String> m20821c(b0 b0Var) throws IOException {
/* renamed from: a */
public String m15434a(String str, c0 c0Var) {
package p399la;
/* renamed from: la.a /
/ compiled from: DataController */
public class DataController {
/* renamed from: b */
public String m20884b(int i, String str, String str2) {
return this.f15020c.m20893a(i, str, str2);
}
Response:
1.base64:
public static byte[] m22049e(String str) {
return Base64.decode(str.replace(‘-’, ‘+’).replace(‘_’, ‘/’), 0);
}
3.分段解析:
package p441qa;
/* renamed from: qa.g /
/ compiled from: RSAUtils */文章来源:https://www.toymoban.com/news/detail-457045.html
/* renamed from: b */
public sta文章来源地址https://www.toymoban.com/news/detail-457045.html
到了这里,关于某果app逆向分析的文章就介绍完了。如果您还想了解更多内容,请在右上角搜索TOY模板网以前的文章或继续浏览下面的相关文章,希望大家以后多多支持TOY模板网!