V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
推荐学习书目
Learn Python the Hard Way
Python Sites
PyPI - Python Package Index
http://diveintopython.org/toc/index.html
Pocoo
值得关注的项目
PyPy
Celery
Jinja2
Read the Docs
gevent
pyenv
virtualenv
Stackless Python
Beautiful Soup
结巴中文分词
Green Unicorn
Sentry
Shovel
Pyflakes
pytest
Python 编程
pep8 Checker
Styles
PEP 8
Google Python Style Guide
Code Style from The Hitchhiker's Guide
ARMILKCHEN
V2EX  ›  Python

请教懂数据采集的大佬们一个抓包加密的问题

  •  
  •   ARMILKCHEN · 2020-04-28 18:00:01 +08:00 · 1778 次点击
    这是一个创建于 1704 天前的主题,其中的信息可能已经有所发展或是发生改变。
    返回的 xhr 看起来是 base64 但解译后还是乱码 感觉是自己做了别的映射
    {"code":0,"d":"LBcnV1QrZGB4bXsyXTcmJlwLf1pdJydGPzceLCUxZz8zVDBdZgFkYDNjNSNLMQA5VjVCUW07OVdvdGN4bnMAd28GcggAfnZ2ai04MUwQJS1TIFNgQCIxEHd/YnxmdwJjdUYwSnwvNS4dMT0jTCABMEIxFA4btMKCq9rkqOvQ1Nnn3NODEmJkNikyLRdIITQ9Vx1SFgNwYVd1LTEoZnFWKjUBcwkHfHc7cHZrd1x3d2UQOFdHTQckViw6Nw45KEIuOUxmAl47KjZkYzUjSzEAOVY1QlF3NyNBb3RwNgpnbSYzaWYCbGxzP3AiOicIcTEsUGABBQ5gZVN1eWB4MndubXtpZltROiM9JzMgHhp/OzxeOBpoGzY7XywnPBF0f25tsKz63YroGnhkHXshUComLG52DGgbHAgQYRJwPj8oWi4kXRJZXDsjBmp7BWAMcGx4A2IPAApnZAV0fWF1YXQGE3UZGBpZIyEZICQ6KV0hCWsIIERBXH4IECI8Oyo/K1MjCEElX0MSZGATHHUeGik8J1kIFA5lcDxGOT4hd3lqUC4+Xy1ZWC8pdCogMCZNazYmX3tFC1A2CG44fmJ+MnQEeWYDcQAHf39ieHZpdAl2YHFuCEMECWBiRSs8DhEjdQJ8M0Y0UVQrNAYUNGlyCnMzJkAIakEJYmdWPS0Ob3oZECQyTBgaChJkKXcoPR5kMGV5ATAHAg9jYgd1eWN0bnUFf2EEdw0IEhoveHFrdE8jJxVuIQYECjYnQiQqNz8KGUd/ZwdyXl88GgY9cWlxXDU2FRB4ahZdMyBXEWxofGN9BnlvBHYMAH52amQdezJXNiEAVggUDlcnOF5hEnAuJCBTOzJhLVVVEmRgeXRhdAt0YXEKYAAFDX4IED08PS4zNkEcI1QwTUMSZGB5bQVgWyQhLFU7RE13MzlXPhJwdw0YHhN1QS1MXCsaeHIde6Ww9LD2sbCMjtzx/9r47rvN16yq/b6W2t6C5a/H6qbk62RneRUQP1NNZjs6RhFsaCMjKV5jCxcmSlkrIAZqewVg3tn5r7jx3pqWcruOxab8/b7Ft6vpmqK9l6nW7qf90KC42bP7k7K1h9za5Nry1rTR36GI9bKw992PzaDS2anm29HF1KyWwtO5r7XOtq/O9K/W49DPygaipLh/f7zf5L36sqDYwd3outKt5LG6/anp3rPrrKzXtKOGvqbh2K/b3aug97zqrLKEn9DP9tXw573x2qCW2bK40t2AwaPJ7anm3ND6y6yixdOEtrfupajC6Kry+9bzzdD7u9fewL/J5Lz4j6PJxNfel9G03bCO16vl6LL4rqvtj6GpqKbB7qDx+6G4x7HyvGbQqLG37qeo8tKo8c7d89vd653Vw8m+9Nux9qet4erW7ozcvvi8hvSm5uCy/IKpyqWirqmh+taty/Gksc6wwYSwi6jd6NIGfX636cygveW+rfbRk9Cg6OOoxODf+Pyhh/TftLi176up9Pal++PRz9bS4IbVwvy/8fOwwZCm1cjX5LnRg8WxvveoxvKzz5Oq85KhtrWr8f+s/MWmgv+w2Kq3trXc9sLXwNi339qgjeS+tdbdgMGjye2u5c7fzeSsjdffqZu16ZurxsKp7v/XwMDd8ZjYzsO//+S9/6Sjwv/VzrLWuc6yksqn18C0xa+s17dkaGYNZrzV0bH2kKLPzdvUudKh3L2v76nv5LDNhqrLna2lkqfF8qf91aSv57zJvbKGoNbu2NfCxrrO66yq/bGY5tGT0KDo46Xl4t7X+Kqy1t6LoLT0harU1qTL59Xy/tPZndjJ7L7yz7zyt6Dv3tfYjNOd7LCO16vtzrHVtKrWkKGCh6ja163L+Ke1yrH1qLCKrtDH69rO77b166OQyrCvwN+4/6Ply6PZ3t3NzqCy9NS0pLHUsKvZ+6jK7QCpy72ggLuo0fan/dWqu+Sx8Y+ylLHczvzV6fC3weyhivWwi+DcjNmu5dOp+M7d+tauotLTppG6+5Cr2eSo2dTVwefa+LTU9sa+8tq89Z2h6NXX5qHQhN+9rs2m9My++7Gq86+hpICoyP+g5v+mgv+y95a7irjQztTa68+378iguO+ym83dteai5dWow97bxdesl+3Sj7e16aOp9tir3/vXx+fT67fVwey/3O+9+Y93Zay319GuvbvMgKTtzKvk7tvS9dL5kd/yyr7wwb7Xkq374dbvgdyGyrCJ+qvCw7n5vqvskHUIAH6j38ul4vXe5emvudnSjLJjZAKowfii6sna+vfcxLnX9d+/+M68+K+t9N7b1aXTo9azlvOr3ve/3YCp2ZKhj5Wq+8as++Onqd269b6ygYXc3cPX6em34+Cjnu2/isrbsMwaeGQdezFXMCcqVwgUDghhbQJ9Yg5vNSpfPzZbPXFUPRp4chpoewBzZn1veGoWTSskVxFsaHtmdQJ6e2lmXlUvMi86JCoeGn8OewNmARgNZXgAdH5neW4YHhN1UzFWVBEjIjwzOCFMGXdzH2VLFkQv","v":1}

    应该怎么去解决这种加密情况阿?
    5 条回复    2020-04-28 18:58:39 +08:00
    ARMILKCHEN
        1
    ARMILKCHEN  
    OP
       2020-04-28 18:00:33 +08:00
    ARMILKCHEN
        2
    ARMILKCHEN  
    OP
       2020-04-28 18:05:48 +08:00
    用断点跑出应该是这段代码进行操控
    Curtion
        3
    Curtion  
       2020-04-28 18:13:25 +08:00
    base64 只提供一个编码方式,原始数据是什么含义是未知,解 ASCII/Unicode 乱码很正常。要继续追踪这段数据它是怎么处理的
    ARMILKCHEN
        4
    ARMILKCHEN  
    OP
       2020-04-28 18:35:15 +08:00
    @Curtion #3 是的 但对 js 不是很懂 也不知道自己做法是否正确 追踪到了也看不懂...就有点懵
    summerwar
        5
    summerwar  
       2020-04-28 18:58:39 +08:00
    直接运行那段 js 代码 就可以解析出来了,不一定非要知道是啥东西
    关于   ·   帮助文档   ·   博客   ·   API   ·   FAQ   ·   实用小工具   ·   952 人在线   最高记录 6679   ·     Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 · 24ms · UTC 21:38 · PVG 05:38 · LAX 13:38 · JFK 16:38
    Developed with CodeLauncher
    ♥ Do have faith in what you're doing.