声明:
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!
有相关问题请第一时间头像私信联系我删除博客!
前言
今天就不卷了淘系231已经分析完了一大半轨迹优化了很多,后续在分析今天水文睡觉了。
逆向过程
目标滑块
python代码
# -*-coding:utf-8 -*- import random import time import execjs import requests headers = {} cookies = { "cna": "0ap9H2Ca0G4CAcppWq2wRPRX", "isg": "BEFBvKdywolpDSrAx6EuuARYUI1bbrVg_tcwUKOWKsiYimFc679hMG6Yav7MmU2Y" } url = "/nocaptcha/analyze.jsonp" # cp =execjs.compile(open('10010-231.js','r',encoding='utf-8').read()) # n = cp.call('get231') n = requests.get('http://localhost:3000/').text print(n) params = { "a": "FFFF0N00000000009296", "t": f"FFFF0N00000000009296:{int(time.time())*1000}:{random.random()}", "n": n, "p": "{\"key1\":\"code200\",\"ncbtn\":\"368|515.7999877929688|41.60000228881836|33.60000228881836|515.7999877929688|549.3999900817871|368|409.60000228881836\",\"umidToken\":\"T2gAq1cgUhROg6LmhE5KkHqhVW2_janm_kKTFMLMluznX8G0Er4dCphA-9ytmHrOAyM=\",\"ncSessionID\":\"5e701ea15edf\",\"et\":\"1\"}", "scene": "nc_other_h5", "asyn": "0", "lang": "cn", "v": "1", "callback": "jsonp_05322217179728022" } response = requests.get(url, headers=headers, cookies=cookies, params=params) print(response.text) print(response)