Thursday 22 August 2019

[Help] Reverse engineering Aliexpress mobile app

I am trying to understand how the Aliexpress application adds stuff to the cart and then implement this functionality in NodeJS.I captured some HTTP Pockets that are sent when you add something to your cart using mobile app:Headers:POST /v2.0/api/experiment/2/allocate HTTP/1.1 Charset: UTF-8 Content-Type: application/x-www-form-urlencoded Connection: Keep-Alive ab-sign: 98a17f73c6f348d06ad66ebf72b9641e ab-client-version: 1.0.4 app-key: 21371601 app-version: 7.9.2 Content-Length: 272 User-Agent: Dalvik/2.1.0 (Linux; U; Android 9; MI 6 MIUI/9.8.15) Host: abtest.alibaba.com Accept-Encoding: gzip Body:requestBody=WmZzzD7gsE7nB%2FH2vMoSHq6ArdE%2FIPSPJNAPmWa%2Ftr%2FNag2JVsAFnHFIzvFK2aC9usrJ1HC4hmzWbBJqBPPFh14JRYrom7txR7W%2BBGMuZwSD47ExCRZM75wQ0SRWl7uOnb4eFT5RniyoMNd2zUh0Oo8XN3bJLakqkTYrRZSk%2BQpQRe4XXOWBeLNL%2FEcY%2FZXLV9syjxTmQvyv297%2BMZCzlwDtxWt0uRs8r3v%2Bz9FTZg%3D%3D Body looks strange. It looks like typical Base64:WmZzzD7gsE7nB/H2vMoSHq6ArdE/IPSPJNAPmWa/tr/Nag2JVsAFnHFIzvFK2aC9usrJ1HC4hmzWbBJqBPPFh14JRYrom7txR7W+BGMuZwSD47ExCRZM75wQ0SRWl7uOnb4eFT5RniyoMNd2zUh0Oo8XN3bJLakqkTYrRZSk+QpQRe4XXOWBeLNL/EcY/ZXLV9syjxTmQvyv297+MZCzlwDtxWt0uRs8r3v+z9FTZg== But decoding this gave me some unreadable string. According to headers it should be x-www-form-urlencoded.Any idea how does it work?

Submitted August 22, 2019 at 02:46PM by kszyh_pl

No comments:

Post a Comment