In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains the "Python crawler in a video platform encryption parameter analysis", the article explains the content is simple and clear, easy to learn and understand, the following please follow the editor's ideas slowly in-depth, together to study and learn "Python crawler in a video platform encryption parameter analysis"!
Bag grasping and positioning
This website is more sensitive, so let's go through it quickly, don't study it in depth, seal the warning.
Let's take a look at the requests that need to be analyzed.
This request returns a json data, and the front-end program parses the json displayed on the page.
So let's take a look at his request parameters.
By retrieving it again in the file, you can quickly locate the location of the sign
The second step is to concatenate the g of the first step with the current timestamp, token and the data part of the submitted parameters and pass in h ()
What is more confusing here is token. This token attempt is brought into the cookie by generating a fixed value from different accessed sessions, which can be retrieved directly in the session, just like the value in cookie.
So where did the value of cookie come from?
Through the retrieval, we can see that it is written directly by the request.
When you hit the breakpoint, you can see that h () is a relatively simple js without any confusion. You can directly deduct the code, or you can directly refer to the results of salted fish analysis. This h is the MD5 algorithm, which can be directly implemented with Python.
Sixth, use Python to complete the acquisition of data
Thank you for your reading. The above is the content of "encryption parameter analysis of a video platform in Python crawler". After the study of this article, I believe you have a deeper understanding of the encryption parameter analysis of a video platform in Python crawler, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.