(utf8!) 这是API,还是以自己抓包为准。 curl -X POST -vv 'https://api.anjie-elec.cn/api/cashtopup/ReqAuth?accessToken=aaaaaaaaaaaaaaaaa.bbbbbbbbbbbbbbbb.ccccccccccccc' --data 'MachineId=AAAABBBB&Machinedata=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&StudentId=11111111111111' 下面是对二维码的分析。1365010A这个卡本来有3.25元,另一个卡本来有0.16元,我冲5块钱,下面是一些二维码和服务器通信记录的分析。没做完,台麻烦。 final QR code reply: (sample 0-3) 55 0A7B0391 63EF297A01A09273 773B0DFD 55 0A7B0523 DA8D9DCD37E9654E 77A70DFD 55 0A7B054F 0355A3E715D0E430 777B0DFD 55 0A7B0597 8B860A6283C00938 77330DFD -------- -------- server time something related to server time server raw data reply: (sample 0-3) E4D8C9E6CB8A8E94C32EA7 77DC0DFD 372805 35D890853871D259DD48CA 77A70DFD 9B0140 64D8F5D3767CAE4EB4A8E8 777B0DFD C6043E 4ED8244C112097BB1D4B8B 77330DFD 5D809C -------- same as above another qr code challenge: 0010: current balance (0.16 yuan) 55 A343F703 000A7979D854B3F5F937963B02C48803FA 0010 E31ECB09 0000 qr code challenge: (sample 0-3, the same) 55 A343F703 000A7979D854B3F5F937963B02C48803FA 0145 1365010A 0000 challenge: 55 A343F703 000A7979D854B3F5F937963B02C48803FA 0145 1365010A 0000 A343F703 == machine ID 1365010A == card ID server reply, server time test. time data 37-2B == 98-8C == C 0A7B0C8C: 4B D87B116B4EE666403203 77370DFD 246871 0A7B0C98: C7 D826103518DE005297B6 772B0DFD 279450 0A7B0C99: 00 D826103518DE005297B6 772A0DFD B81D84 server_time = current_timestamp - 1393910716 https://www.unixtimestamp.com/index.php 0A7B0C55 -- Sun, 29 Sep 2019 08:49:21 GMT - 175836245 0A7B0DE6 -- Sun, 29 Sep 2019 08:55:38 GMT