Open adeverteuil opened 4 years ago
Hi @adeverteuil
Thanks for the report. Someone has reported this before, as it appears that the new version of Tangerine implemented a fingerprinting mechanism on the client using Javascript. I haven't found the time to really tackle this issue yet. I might come back and look at it during the Christmas break, but any help is appreciated.
Thanks for the quick response and for the status info!
Looked at it during the holidays... I'm not certain it's due to fingerprinting, since I get the same error if I supply pm_fp
parameter (the fingerprint) that I got from the chrome devtool. Looks like there's now a separate step to obtain a user token when landing on the login page, but I haven't figured out how that user token is tied to the parameters in the cookie that's sent to the server.
👋 hi folks. I have been poking around this repo, haven't tried it yet, but I'm interested in similar goals as I imagine you have with this.
I discovered a great tool/system for debugging this kind of thing, in case you weren't aware of it. It's the POSTMAN app, and the fact that you can use the 'Request Interceptor' strategy which records the request history, which you can then review. https://chrome.google.com/webstore/detail/postman-interceptor/aicmkgpgakddgnaphhhpliifpcfhicfo https://learning.getpostman.com/docs/postman/sending-api-requests/capturing-http-requests/
I am a coder, but I'm not very familiar with python, so using this would be tricky for me
Thanks for your input @Connoropolous. I was using mitmproxy to inspect and record requests/responses.
Nice. P.s. I'm Toronto based too, and also Florinapp looks interesting :)
I'm guessing these are "spare time" projects
Thanks :) It was an excuse for me to learn some react+redux :) With regard to this project, I kinda hit a wall now that they implemented browser fingerprints. I tried to use puppeteer (with an embedded chrome) to login and that didn't work either. If anyone has any ideas I'm all ears.
What are these "browser fingerprints"?
mitmproxy seems pretty amazing, was just checking it out.
@kevinjqiu for what its worth (which might not be much) I discovered the existence of https://mgateway.tangerine.ca today, doing some digging, by proxying network traffix of the mobile app. However, their security on the app seems very tight too, it quickly blocks the app saying it can't form a secure connection. Despite me using the mitmproxy root certificate setup that they document, for handling https traffic.
Oh, also, looks like their app is just a web-wrapper HTML thing, so it has all the annoying things that the web version has.
Thanks for taking a look, @Connoropolous . FWIW, I didn't have a problem with using mitmproxy's root cert.
I am interested in this project but found out that it isn't working anymore sadly.
Has anyone investigated the use of requests_html
which can interpret JavaScript by using Chromium under the hood?
Hello,
I haven't imported my statements since July, so I'm not sure when the problem started.
I checked issue #2 and the problem happens at a different stage.
When sending the POST with
command=PersonalCIF
andACN=XXXX
parameters, the response contains:I checked the web browser console and the
location.replace()
parameter in the response should be"/web/Tangerine.html?command=displayChallengeQuestion"
.Following this, when sending the GET with the
command=displayChallengeQuestion
parameter, the response is the samelocation.replace()
script instead of the expected JSON document.Here is the full DEBUG output: