本文介绍了未经授权的WL.Client.invokeProcedure调用的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧! 问题描述 29岁程序员,3月因学历无情被辞! WL.Client.InvokeProcedure是一个内部API,由Worklight Framework使用,但是,您可以在将调试模式下的设备与Google Chrome连接后调用此API。我们如何限制对WL.Client.invokeProcedure的访问,以便用户无法利用此调用? 解决方案我认为测试有点误导,因为你是攻击者将有几个先决条件:拥有操纵代码,调用代码并知道什么是普通用户的技术技能。 那说: 在即将推出的MobileFirst Platform v7.0中,您将能够混淆移动应用程序的代码(iOS,Android等)。您也可以立即手动执行此操作。 / p> 现在您已经可以启用应用程序真实性保护功能以及webResourcesChecksumTest和webResourcesEncryption功能。请参阅安全元素部分。 /c_the_application_descriptor.htmlrel =nofollow>应用程序描述符用户文档主题。 上面将为您的应用程序添加几层保护,要么阻止篡改应用程序代码,如果其校验和已更改并且验证应用程序标识,则不允许使用该应用程序。 WL.Client.InvokeProcedure is an internal API and used by Worklight Framework, however, you can call this API after connecting a device in Debug mode with Google Chrome. How can we restrict the access to WL.Client.invokeProcedure so that a user is not able to Exploit this call? 解决方案 I think the test is a bit misleading since "you" as an attacker will have several prerequisites: have the technical skill of manipulate code, invoking code and know what is a "normal" user.That said:In the upcoming MobileFirst Platform v7.0 you will be able to obfuscate the code of a mobile app (iOS, Android and so on). You can also do this manually now.Already now you can enable the Application Authenticity Protection feature as well as the webResourcesChecksumTest and webResourcesEncryption features. See the security element section in the Application Descriptor user documentation topic.The above will add several layers of protection to your application, either preventing tampering with the application code, not allowing to use the app if its checksum has change and verify the application identity. 这篇关于未经授权的WL.Client.invokeProcedure调用的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持! 上岸,阿里云!
08-24 17:28