Video APP Anti-crawler Strategy beyond Cognitive range

problem description

recently encountered a very tricky video APP-- Mobile Cinema while practicing crawler skills. In my limited knowledge, fiddler , Xposed , JustTrustMe and other tools all failed in the face of this APP. Is there any great god who can take the time to analyze the anti-crawler strategy of this APP?. Guide me to which direction I should try to crack next?

what methods have been tried

1. fiddler Agent captures http request-unable to get video resource url;

: https ;

2.fiddler https APP 404;

:;

3.Charles https APP 404;

: 8.0 ;

4.Xposed + Android6.0 mumu + JustTrustMe SSL PinningAPP ;


:APP

5.Xposed + Android4.4 + JustTrustMe SSL Pinning;

guess the reason: the video request does not use a regular protocol that can be captured by fiddler such as tcp/http/https/WebSocket?

ask for help

is there a god who can take the time to analyze this APP"s anti-crawler strategy and guide me in which direction I should try to crack it next?


I was also climbing the video this morning. APP, has been reporting wrong SSL certificate problems, and then added verify=False to get.
found a get request with m3u8 in the URL, which returned a bunch of ts links, a 3-second video link.
wait for God to reply to you, follow

MySQL Query : SELECT * FROM `codeshelper`.`v9_news` WHERE status=99 AND catid='6' ORDER BY rand() LIMIT 5
MySQL Error : Disk full (/tmp/#sql-temptable-64f5-1b34ea4-34300.MAI); waiting for someone to free some space... (errno: 28 "No space left on device")
MySQL Errno : 1021
Message : Disk full (/tmp/#sql-temptable-64f5-1b34ea4-34300.MAI); waiting for someone to free some space... (errno: 28 "No space left on device")
Need Help?