TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Reverse-engineering Instagram to access the private API

59 点作者 1il7890超过 11 年前

4 条评论

sjtgraham超过 11 年前
Is it still the case that the app only uses HTTPS to create a session and plain HTTP for everything else? I remember that was the case about a year ago after using mitmproxy to sniff traffic, although I don't recall HMAC being used to sign requests then. Anyway, I wondered then why nobody had used firesheep to devastating effect, e.g. a bot sitting on an open wifi and posting NSFW images to any account on the network.
评论 #6960113 未加载
potomak超过 11 年前
Note that Instagram doesn&#x27;t encrypt requests to their private API, they&#x27;re only signing them. In fact the parameter is called &#x27;signed_body&#x27;, not &#x27;encrypted_body&#x27;.<p>Anyway interesting post.
评论 #6959611 未加载
rnaud超过 11 年前
Isn&#x27;t the fact that they are using a simple HMAC-SHA256 hash also a root of the problem?<p>If instead of using the POST data only to create the hash they added another information, like a the hour of the day. Wouldn&#x27;t it be way harder for a hacker to actually understand what went into signing the request?
评论 #6960032 未加载
SifJar超过 11 年前
Interesting write up. Seems rather simple, really. Presumably Instagram could change their private key and rollout a new client version on each platform, breaking all third party apps using the current key though. Although I guess it&#x27;d be just as easy to get it again.
评论 #6959594 未加载