试图对序列化对象进行逆向工程

时间:2013-12-24 11:46:06

标签: reverse-engineering

我正在尝试对来自未记录的API的48位十六进制数字结果进行逆向工程。我99%肯定它是由我传入的参数创建的对象的序列化版本。

到目前为止,我已根据传入的参数收集了一些数据:

ID      Date        Integer1  Integer2  Result in hex (from Base64 Decode)
0471A   29 Nov 13       0       1       C91CFD6C27FBE7DEC5E8D1B6A4A8A2281656E439184A1F55
0471    29 Nov 13       0       1       9B8D85C7F72D12317E103D8C03A4E872AB09B51F84947775
0471    29 Nov 13       1       1       9B8D85C7F72D12317E103D8C03A4E8720005E3299E478F30
0471    29 Nov 13       1       2       9B8D85C7F72D12317E103D8C03A4E872C0FA99D1FAB9C7C3
0471A   30 Nov 13       0       1       B16D5AC863205E7C270C1CFFEBF05DFE287494D697A9EBE0
0471    30 Nov 13       0       1       BCCF1F4CC7E916D7A97FEFD79AF1A62D35D017565E18214C
0471    30 Nov 13       1       1       BCCF1F4CC7E916D7A97FEFD79AF1A62DAE5DD758EC44527B
0471A   1st Dec 13      0       1       DE792B7BC4DF1BBD3E601D11A96DF4CE658F1D19814FB6AE
0471    1st Dec 13      0       1       6183EE49649D328FC3AAE785ADB76458055B39FC27A201A9
0471    1st Dec 13      1       1       6183EE49649D328FC3AAE785ADB76458860BA31BFD48B872
0471    1st Dec 13      0       2       6183EE49649D328FC3AAE785ADB764585DC848A2ED78B57A
0471    2nd Dec 13      0       1       16CA69D44EC179AFA8E8DBF4B260DBA724F0BED94EFFD359

我注意到如果ID和Date相同,那么结果字节的前半部分也是相同的。解码这些数据的下一步应该是什么?

0 个答案:

没有答案