阿里231.13滑块 验证码分析
referer = ''headers = {"user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0"}url = &
·
声明:
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!
逆向分析
referer = '' headers = { "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 Edg/120.0.0.0" } url = "" response = session.get(url2, headers=headers, proxies=proxies, timeout=30) html = response.text print(html) # 解析 HTML tree = etree.HTML(html) # 处理加工数据不做展示 result = requests.get('http://localhost:3000/get231',json={'t':t,'a':a,'trace':trace,'x5secdata':SECDATA},headers=headers).json() print(result) url = result['231'] bx_et = result['bx_et'] bx_url = result['bx_url'] bxpp = requests.get("http://localhost:3002/getbxpp", json={'pp': pp}).text response = session.get(url, headers=headers, proxies=proxies, timeout=30) print(response.text) print(response.cookies)
结果
总结
1.出于安全考虑,本章未提供完整流程,调试环节省略较多,只提供大致思路,具体细节要你自己还原,相信你也能调试出来。
更多推荐
所有评论(0)