Video APP Anti-crawler Strategy beyond Cognitive range

problem description

recently encountered a very tricky video APP-- Mobile Cinema while practicing crawler skills. In my limited knowledge, fiddler , Xposed , JustTrustMe and other tools all failed in the face of this APP. Is there any great god who can take the time to analyze the anti-crawler strategy of this APP?. Guide me to which direction I should try to crack next?

what methods have been tried

1. fiddler Agent captures http request-unable to get video resource url;

: https ;

2.fiddler https APP 404;

:;

3.Charles https APP 404;

: 8.0 ;

4.Xposed + Android6.0 mumu + JustTrustMe SSL PinningAPP ;


:APP

5.Xposed + Android4.4 + JustTrustMe SSL Pinning;

guess the reason: the video request does not use a regular protocol that can be captured by fiddler such as tcp/http/https/WebSocket?

ask for help

is there a god who can take the time to analyze this APP"s anti-crawler strategy and guide me in which direction I should try to crack it next?


I was also climbing the video this morning. APP, has been reporting wrong SSL certificate problems, and then added verify=False to get.
found a get request with m3u8 in the URL, which returned a bunch of ts links, a 3-second video link.
wait for God to reply to you, follow

Menu