In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "Python crawler on an e-commerce token parameter encryption logic analysis", interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Next let the editor to take you to learn the "Python crawler on an e-commerce token parameter encryption logic analysis"!
Packet capture Analysis and encryption location
Open the website first and locate the request that needs to be analyzed.
The request carries a signature, and the value is always the same, the number of digits has been maintained at 32 bits, it is safe to guess that it is MD5 encrypted, and this is also verified by subsequent analysis.
First global search, because this parameter name is not confused so it can be searched directly, but this result is more, it is more time-consuming to find.
The first way is to retrieve only two token:, results, which can be located as long as you retrieve them again.
The second is the XHR breakpoint mentioned before, but here the novice is not recommended to use the XHR breakpoint, the novice will be confused after a circle of analysis.
Here is an idea. If there are a lot of search results, but the XHR breakpoint cannot analyze which stack, you can search for keywords in each stack of the XHR breakpoint, and then type the breakpoint analysis as a means of filtering.
Let's hit the xhr breakpoint first.
And then analyze it one by one in the stack.
You can see token in this position (none of the tips above are used)
Encryption analysis
Hit the breakpoint, refresh
The s here is the id value passed in.
After that, you can directly step into the encryption logic b.a
You can see here that the main logic here is r (). After one r (), the result is spliced with s and then passed into r ().
So just explore r (), step directly into it, and you can see the following results
It's a little simple and obvious, in order to verify the results, compare the encryption results of the page with our own encryption.
Results of the page:
Our own test results:
At this point, I believe that everyone on the "Python crawler on an e-commerce token parameter encryption logic analysis" has a deeper understanding, might as well to the actual operation of it! Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.