In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces the "Python crawler some index analysis platform decryption logic analysis". In the daily operation, I believe that many people have doubts on the decryption logic analysis problem of an index analysis platform of Python crawler. The editor consulted all kinds of data and sorted out a simple and useful operation method. I hope it will be helpful to answer the doubts of "Python crawler index analysis platform decryption logic analysis". Next, please follow the editor to study!
Packet capture Analysis and encryption location
First, let's take a look at the results that need to be analyzed. We can see that there are two values on the page: the timeline and the index value. Now we are going to grab the value of this index axis.
After a simple analysis, we can see that the following request has a string of data values returned in ciphertext. We boldly guess that this is the encrypted return result. There must be decryption logic on the page to decrypt this data.
You can see that the encryption result has three segments, namely pc, all and wise. The logic of decryption here should be the same, so we only need to analyze one.
Search data, pc, wise and other key times did not find the encryption logic, xhr breakpoint also tried, there is no logic to find decryption.
By referring to the previously written articles on Niu data and the ideas mentioned in some of the basic articles I have written before, we can locate them by searching encrypted and decrypted keywords.
It suddenly occurred to me that there are decrypted keywords decrypt that can be tried again.
Sure enough, I found the following results
I chased in and hit the breakpoint, which is exactly the logic we need (I hope all the front-end engineers can write notes)
You can also find the upper layer of logic through the stack to confirm
Encryption logic analysis
This logic is very clear. Let's copy it directly and see if we can decrypt it.
After that, the logic is very simple.
This logic can also be copied into the Python version.
Def decrypt_data (password, data):
N = list (password)
I = list (data)
A = {}
Result = []
Ln = int (len (n) / 2)
Start = n [ln:]
End = n [: ln]
For j, k in zip (start, end):
A.update ({k: J})
For j in data:
Result.append (a.get (j))
Return '.join (result)
At this point, the study on the "Python crawler some index analysis platform decryption logic analysis" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.