-
Notifications
You must be signed in to change notification settings - Fork 44
又双叒 更新了 #21
Comments
key9: $[_0x3c85('0x29')][_0x3c85('0x2a')] = function(_0x5db4e8, _0x53ad84, _0x11f8e9) |
我吐了,我严重怀疑他们在看我们,我们刚搞出来他们就加一个签名 |
哈,我刚准备问key9哪来的 |
这页面里的js复杂度是我人生中见过最复杂的 |
加油,持续搞定他 |
|
我天,你也太快了,你是魔鬼吧😃 |
sixsixsixsix |
为啥我试了还是 “系统异常,请重试!”,求教大神 |
首先图片获取,大部分参数是不检验的,只有有参数,就能直接获取到 不知道你时哪里错误
|
这部分有js吗? |
前面获取图片、数据解码都OK的,就最后提交vatQuery接口请求,一直报“系统异常,请重试!”,很难找到是哪个参数不行 |
@carrytameng 你用Chrome抓一下包,对比分析一下参数呗,flwq39每次都不一样,但是别的应该差不多。 |
我用selenium来自动测试也是报这个错,我用的Chrome 81.0 ,而后我换成它官方推荐的Chrome 55之后就可以查询了,同一张发票。你可以试试 request post的时候改一下 user-agent试试看吧,我没测试。 |
Webdriver行不通,因为它4月更新有反自动化的东西,会识别webdriver |
好吧,难怪好好的突然怎么就用不了了,原来反爬了。 |
把window.navigator.webdriver值改成undefined之后可以破解它的反自动化爬取,页面上有能正确查询发票,但是我用mimtdump脚本抓取到response.text的时候,返回的数据确是一堆字母,形如下:{"data": "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"},所以这个就是你们说的那个flwq39加密吗? |
flwq39那个是请求时候的签名,服务端校验之后决定是否正常返回,你这个data是正常返回之后的加密数据,需要解密,之前验证码返回的data加密我已经破解过了,这个不确定和验证码那里的是不是一样,估计这破网站的尿性,应该是不一样的算法。 |
我用你的yzm.py,返回是这个InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings |
你的程序发的内容是:GET https://fpcy.anhui.chinatax.gov.cn/NWebQuery/yzmQuery?callback=jQuery1102045870758052653293_1581247300793&fpdm=034151900111&fphm=00867099&r=0.2992333402900412&v=V2.0.02_002&nowtime=1589423189354&area=3400&publickey=EA6378C03A420E78059707B76ECEF8FC HTTP/1.1 是不是必须要有cookie才可以?请指教 |
和cookie没有关系,前端时间更新了两个签名 |
明白了,谢谢,只能用selenium来查发票,就是速度很慢 |
key9应该是 _0x3f04ae['prototype']['yzm'] = function(_0x30e042, _0x46d655, _0xd57abe) 这个函数吧? |
这个文章好像能完美解决key问题https://blog.csdn.net/qq_35228149/article/details/106818057 |
callback: jQuery110208448685595287795_1588213215377
fpdm: 011001600211
fphm: 12412412
r: 0.5140375363656053
v: V2.0.03_001
nowtime: 1588215652582
publickey: 0E4A6CDDAFCC4687986D13F2027E2B50
key9: e2243655225930a88366a5c0c20e753c
_: 1588213215390
flwq39: WfuTVayxbBZFRcuVwLn1tEkN98Rl2GFfR5n6qeJ9K17djSc14EN7o8grOnF21Vikhrcvxyp8Lz89znRqkOL79rAixP9qllQGVC639L18ZVymI3La97FrcvY3PRcNEAFpExoFhu6+06yBP8Q4epeoDByXvY02vgcpVwgyRNBjELA=
The text was updated successfully, but these errors were encountered: