Primer paso de la investigacion. Se aportan el .apk, las carpetas con el apk extraido y el apk descompilado. El archivo API_DOCUMENTATION.md es un archivo donde se anotaran los descubrimientos del funcionamiento de la API, y los .py son scripts para probar la funcionalidad de la API con los métodos que vayamos encontrando. Finalmente, los archivos .js son scripts de Frida para extraer informacion de la APP durante la ejecucion.

This commit is contained in:
2025-12-04 13:59:54 +01:00
parent f2fd1c3bf5
commit e0133d2ca2
10432 changed files with 1019085 additions and 1 deletions

View File

@@ -0,0 +1,123 @@
package m3;
import e3.G;
import java.security.KeyStore;
import java.security.Provider;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Iterator;
import java.util.List;
import javax.net.ssl.SSLContext;
import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;
import javax.net.ssl.TrustManager;
import javax.net.ssl.TrustManagerFactory;
import javax.net.ssl.X509TrustManager;
import kotlin.collections.CollectionsKt__IterablesKt;
import kotlin.jvm.internal.Intrinsics;
import org.conscrypt.Conscrypt;
/* loaded from: classes3.dex */
public final class h extends n {
/* renamed from: d, reason: collision with root package name */
public static final boolean f7816d;
/* renamed from: c, reason: collision with root package name */
public final Provider f7817c;
static {
boolean z3 = false;
try {
Class.forName("org.conscrypt.Conscrypt$Version", false, f.class.getClassLoader());
if (Conscrypt.isAvailable()) {
if (f.a()) {
z3 = true;
}
}
} catch (ClassNotFoundException | NoClassDefFoundError unused) {
}
f7816d = z3;
}
public h() {
Provider newProvider = Conscrypt.newProvider();
Intrinsics.checkNotNullExpressionValue(newProvider, "newProvider()");
this.f7817c = newProvider;
}
@Override // m3.n
public final void d(SSLSocket sslSocket, String str, List protocols) {
int collectionSizeOrDefault;
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
Intrinsics.checkNotNullParameter(protocols, "protocols");
if (!Conscrypt.isConscrypt(sslSocket)) {
super.d(sslSocket, str, protocols);
return;
}
Conscrypt.setUseSessionTickets(sslSocket, true);
Intrinsics.checkNotNullParameter(protocols, "protocols");
ArrayList arrayList = new ArrayList();
for (Object obj : protocols) {
if (((G) obj) != G.HTTP_1_0) {
arrayList.add(obj);
}
}
collectionSizeOrDefault = CollectionsKt__IterablesKt.collectionSizeOrDefault(arrayList, 10);
ArrayList arrayList2 = new ArrayList(collectionSizeOrDefault);
Iterator it = arrayList.iterator();
while (it.hasNext()) {
arrayList2.add(((G) it.next()).f6261a);
}
Conscrypt.setApplicationProtocols(sslSocket, (String[]) arrayList2.toArray(new String[0]));
}
@Override // m3.n
public final String f(SSLSocket sslSocket) {
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
if (Conscrypt.isConscrypt(sslSocket)) {
return Conscrypt.getApplicationProtocol(sslSocket);
}
Intrinsics.checkNotNullParameter(sslSocket, "sslSocket");
return null;
}
@Override // m3.n
public final SSLContext k() {
SSLContext sSLContext = SSLContext.getInstance("TLS", this.f7817c);
Intrinsics.checkNotNullExpressionValue(sSLContext, "getInstance(\"TLS\", provider)");
return sSLContext;
}
@Override // m3.n
public final SSLSocketFactory l(X509TrustManager trustManager) {
Intrinsics.checkNotNullParameter(trustManager, "trustManager");
SSLContext k4 = k();
k4.init(null, new TrustManager[]{trustManager}, null);
SSLSocketFactory socketFactory = k4.getSocketFactory();
Intrinsics.checkNotNullExpressionValue(socketFactory, "newSSLContext().apply {\n…null)\n }.socketFactory");
return socketFactory;
}
@Override // m3.n
public final X509TrustManager m() {
TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
trustManagerFactory.init((KeyStore) null);
TrustManager[] trustManagers = trustManagerFactory.getTrustManagers();
Intrinsics.checkNotNull(trustManagers);
if (trustManagers.length == 1) {
TrustManager trustManager = trustManagers[0];
if (trustManager instanceof X509TrustManager) {
Intrinsics.checkNotNull(trustManager, "null cannot be cast to non-null type javax.net.ssl.X509TrustManager");
X509TrustManager x509TrustManager = (X509TrustManager) trustManager;
Conscrypt.setHostnameVerifier(x509TrustManager, g.f7815a);
return x509TrustManager;
}
}
StringBuilder sb = new StringBuilder("Unexpected default trust managers: ");
String arrays = Arrays.toString(trustManagers);
Intrinsics.checkNotNullExpressionValue(arrays, "toString(this)");
sb.append(arrays);
throw new IllegalStateException(sb.toString().toString());
}
}