爬虫接口结果是这样 纯字母数字组合 怎么办?

2018-07-05 14:45:17 +08:00
 yellowmarlboro

爬 app 的内容, 抓出接口的都是这些东西,

ADJD6RWCxaKzOX_DU5ksE2CnAr8n60kzOeTsEX8n60hOxDEITzfzcyrX6hWSA2kzOeEfovJ0Z5PC6qEI5lszL5KzOe-4TNkPWeQCovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1oYO1jb5I6B9IoBa1S0u11b-ppD816vsIGB41x2i16yG1LqLmmvvEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDT9jPTNjPTDEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5Mk9MvEsEXWexlJuEej4oeQfovJCc0hDR01nx5kzOzEPONTbGzjbTeQfWvJgoaszL5KzOe-4TNkPWMklovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514EejzIoBZ1ozWI6q6ppDT1xvP1Szw1SDJ1x2i16yG165GEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDT9jfWejCTvEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MkPEzfzc0Wwc2kzOeTYTNQsEXh96RJ3x2rF6qEIEe-mTzjbGzjmON-PEX4sADJS6vEITMKfWM-fTN-sE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouYxiuHZVuSGVuSJVwwE9XXJiXdIxHYVjzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOeTlOeKmEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWHKzovJ9Z0gD6qEITzmfTvfzURWucugYZ5CuEejz_zjb1mzPEX4sADJS6vEITMKfWMQlTNEsE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouYxiuHZVuSGVuSJVwwE9uwjeXdIxHYVjzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOeECOeEDEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWDEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPT9TbGzjbWMECWqJgoaszL5KzOe-4TNkfWMKDovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz11D3GzVX2jMHYEluSxlXebXwwEfzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEDOe-1OeE9EzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeksE2Cw6yhsEejzU2u0xD8ZWu8sURTd_vEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPWMQbGzjbWekmOqJgoaszL5KzOe-4TNkfTe-DovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1ozW1L5g1mISmmvvEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDTejfWNj4TzEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MZ0LqEsEXWexlJuEejPoeQfovJCc0hDR01nx5kzOzEPT9dbGzjbWeKPWvJgoaszL5KzOe-4TNkfTMKDovJnca8J6vEITe-1WMQDTqfzZR8fU2hDc0uwxzEIEe-YTqmDEzfzZR8fU2hDc0uwx2Ww6ykzOe-DovJex0CF6514Eejz1pY61L5g1LqL1ozcIG5i1j2M1x2i16yGEzfzZ0gFx5hYUrgHZR_uEejzTeQPOv4fWD4fWvQDTejfTMjPWqEsE2Wwx5CuxX_MxlhDZ0kzOeQsE2Wwx5CuxX_3cl_nUah9EejDovJFx0_uxvEIEX6SU27d5MdCEzfzc0Wwc2kzOe-YTNQsEXh96RJ3x2rF6qEIEe-9OvjbGzjDWNTCEX4sADJS6vEITMKfWNHfT9ksE2rfc-uHEejDTMHCTNEPovJnca806RJ9L5gYEejzTqmPoeEzovJnca806RJ9L5gYZ0gH6qEITMEsE2Wwx5CuxXKzOzouSbRuSbRuSxljVmKzovJex0CF6514R0_nUykzOzEDTN-moMQloMQ4ENEPOeQPOeQlEzfzZ0gFx5hYUrWwURJe6qEITvfzZ0gFx5hYUrg9Uyr4URTzOeEsE2Cw6yhsEejzU2u0xD8ZWC8sURTzovJ9Z0gD6qEIWqmfTvfzURWucugYZ5CuEejzTMdDGzjbGeHPWNcz3qPpE2uHEejPWNQ4ONHfWqfzZR8fq5KzOeEPOMkfTe-sE2rfca6ucXWSx0mzOzEPoe-

2618 次点击
所在节点    Python
10 条回复
rocketman13
2018-07-05 14:47:07 +08:00
一个接口有这么长?
yellowmarlboro
2018-07-05 14:49:42 +08:00
@rocketman13
哦 不 接口抓下来的内容是这些
DsuineGP
2018-07-05 14:52:24 +08:00
安卓的 app 反编译一下,拿到密钥解密就是了
glacer
2018-07-05 14:55:52 +08:00
页端的话要么追踪调试 js 摸清解密方式,要么用浏览器抓取。
APP 的话要么反编译获取解密函数,要么用模拟点击的形式实现。
yellowmarlboro
2018-07-05 14:59:14 +08:00
@glacer
APP 的话 模拟点击? 用 appnium 还是什么?
yellowmarlboro
2018-07-05 16:28:23 +08:00
@DsuineGP
反编译了 代码都混淆怎么办?
java 不好的我看不出来啊 ..
SorcererXW
2018-07-05 16:32:10 +08:00
就算是反编译也不一定看得出,有可能是在本地用 NDK 处理加解密的
ccc008
2018-07-05 16:34:49 +08:00
@yellowmarlboro 只能一点一点分析了,没有捷径
dengtongcai
2018-07-05 19:18:46 +08:00
@DsuineGP 对头
crawl3r
2018-07-05 19:23:00 +08:00
一年就是加密后的数据,你需要逆向找到解密算法和密钥

这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。

https://www.v2ex.com/t/468369

V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。

V2EX is a community of developers, designers and creative people.

© 2021 V2EX