Android攔截並獲取WebView內部POST請求參數

原由:

有些時候自家APP中嵌入的H5頁面並非自家的。可是不少時候又想在H5不知情的狀況下獲取H5內部請求的參數,這應該怎麼作到呢?html

帶着這個疑問,就有了這篇博客。android

實現過程:

方案一:

最開始想到的方案是直接攔截H5中全部的請求:git

 1 webView.setWebViewClient(new WebViewClient() {
 2     @Override
 3     public WebResourceResponse shouldInterceptRequest(WebView view, WebResourceRequest request) {
 4         try {
 5             URL url = new URL(request.getUrl());
 6         } catch (MalformedURLException e) {
 7             e.printStackTrace();
 8         }
 9         Log.e("InternetActivity", request + "");
10         return super.shouldInterceptRequest(view, request);
11     }
12 
13 });

可是經過此方法只能獲取get請求的參數(由於參數直接拼在了url連接中),對於post請求的參數迫不得已。github

方案二:

後來參考了request_data_webviewclient,有了新的實現方式,具體原理爲:給H5注入一段js代碼,目的是在每次Ajax請求都會調用Android原生的方法,將請求參數傳給客戶端。web

具體流程以下:安全

 

其中,dom

js注入代碼:async

 1 <script language="JavaScript">
 2 
 3     function generateRandom() {
 4       return Math.floor((1 + Math.random()) * 0x10000)
 5         .toString(16)
 6         .substring(1);
 7     }
 8 
 9 
10     // This only works if `open` and `send` are called in a synchronous way
11     // That is, after calling `open`, there must be no other call to `open` or
12     // `send` from another place of the code until the matching `send` is called.
13     requestID = null;
14     XMLHttpRequest.prototype.reallyOpen = XMLHttpRequest.prototype.open;
15     XMLHttpRequest.prototype.open = function(method, url, async, user, password) {
16         requestID = generateRandom()
17         var signed_url = url + "AJAXINTERCEPT" + requestID;
18         this.reallyOpen(method, signed_url , async, user, password);
19     };
20     XMLHttpRequest.prototype.reallySend = XMLHttpRequest.prototype.send;
21     XMLHttpRequest.prototype.send = function(body) {
22         interception.customAjax(requestID, body);
23         this.reallySend(body);
24     };
25 
26 </script>

客戶端攔截請求:ide

 1 @Override
 2 public final WebResourceResponse shouldInterceptRequest(final WebView view, WebResourceRequest request) {
 3     String requestBody = null;
 4     Uri uri = request.getUrl();
 5 
 6     // 判斷是否爲Ajax請求(只要連接中包含AJAXINTERCEPT便是)
 7     if (isAjaxRequest(request)) {
 8         // 獲取post請求參數
 9         requestBody = getRequestBody(request);
10         // 獲取原連接
11         uri = getOriginalRequestUri(request, MARKER);
12     }
13 
14     // 從新構造請求,並獲取response
15     WebResourceResponse webResourceResponse = shouldInterceptRequest(view, new WriteHandlingWebResourceRequest(request, requestBody, uri));
16     if (webResourceResponse == null) {
17         return webResourceResponse;
18     } else {
19         return injectIntercept(webResourceResponse, view.getContext());
20     }
21 }

客戶端注入js代碼:post

 1 private WebResourceResponse injectIntercept(WebResourceResponse response, Context context) {
 2     String encoding = response.getEncoding();
 3     String mime = response.getMimeType();
 4 
 5     // WebResourceResponse的mime必須爲"text/html",不能是"text/html; charset=utf-8"
 6     if (mime.contains("text/html")) {
 7         mime = "text/html";
 8     }
 9 
10     InputStream responseData = response.getData();
11     InputStream injectedResponseData = injectInterceptToStream(
12             context,
13             responseData,
14             mime,
15             encoding
16     );
17     return new WebResourceResponse(mime, encoding, injectedResponseData);
18 }

注:根據谷歌官方文檔,mime必須爲"text/html"。

反思:

  • 開發過程當中遇到了頁面一直顯示不了的問題,實際上就是由於獲取到的mime是"text/html; charset=utf-8",得改爲"text/html"
  • 經過此方法也可篡改response與request,但不要濫用;
  • 因此說,Android確實不安全!

GitHub地址:webview_post_data

 

你們若是有什麼疑問或者建議能夠經過評論或者郵件的方式聯繫我,歡迎你們的評論~

相關文章
相關標籤/搜索