lib_um_crypto_rust/um_crypto/xmly/Readme.MD

23 lines
917 B
Markdown

# 喜马拉雅文件格式
## 安卓端
`0x400` 字节混淆,打乱顺序 + xor 固定密钥。
## PC 端
Electron 调用 node 的 `crypto` 层加密,完事后扔原生层(旧版)/Wasm(新版)再处理一遍。
其它人的逆向过程:
- [喜马拉雅 xm 文件解密逆向分析 [Electron]][xm_zh] | [存档][xm_zh_archive]
- [Reversing WebAssembly with pure guesswork - Ximalaya xm encryption (英文, 内容更多)][xm_en] | [存档][xm_en_archive]
[xm_zh]: https://www.aynakeya.com/articles/ctf/xi-ma-la-ya-xm-wen-jian-jie-mi-ni-xiang-fen-xi/
[xm_zh_archive]: https://web.archive.org/web/2023/https://www.aynakeya.com/articles/ctf/xi-ma-la-ya-xm-wen-jian-jie-mi-ni-xiang-fen-xi/
[xm_en]: https://www.aynakeya.com/articles/ctf/reverse-with-puring-guessing-ximalaya/
[xm_en_archive]: https://web.archive.org/web/2023/https://www.aynakeya.com/articles/ctf/reverse-with-puring-guessing-ximalaya/