python 爬虫 破解 acw_sc__v2 参数

该代码段展示了两个Python函数,get_hexxor和get_unsbox,分别用于执行特定的字符串操作,可能是加密过程的一部分。之后,get_arg2函数利用这些函数处理从HTTP请求(使用requests库)中获取的响应文本,并构造一个新的cookie值。整个过程涉及到网络请求、数据解码和可能的反爬虫机制。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >


def get_hexxor(s1, _0x4e08d8):
    _0x5a5d3b = ''
    for i in range(len(s1)):
        if i % 2 != 0: continue
        _0x401af1 = int(s1[i: i + 2], 16)
        _0x105f59 = int(_0x4e08d8[i: i + 2], 16)
        _0x189e2c_10 = (_0x401af1 ^ _0x105f59)
        _0x189e2c = hex(_0x189e2c_10)[2:]
        if len(_0x189e2c) == 1:
            _0x189e2c = '0' + _0x189e2c
        _0x5a5d3b += _0x189e2c
    return _0x5a5d3b
def get_unsbox(arg1):
    _0x4b082b = [0xf, 0x23, 0x1d, 0x18, 0x21, 0x10, 0x1, 0x26, 0xa, 0x9, 0x13, 0x1f, 0x28, 0x1b, 0x16, 0x17, 0x19, 0xd,
                 0x6, 0xb, 0x27, 0x12, 0x14, 0x8, 0xe, 0x15, 0x20, 0x1a, 0x2, 0x1e, 0x7, 0x4, 0x11, 0x5, 0x3, 0x1c,
                 0x22, 0x25, 0xc, 0x24]
    _0x4da0dc = []
    _0x12605e = ''
    for i in _0x4b082b:
        _0x4da0dc.append(arg1[i - 1])
    _0x12605e = "".join(_0x4da0dc)

    return _0x12605e


def get_arg2(response_text):
    # 第一次请求获取js代码
    headers3 = {
        'Cookie': '_uab_collina=163204132608427560298046; acw_tc=76b20ff816320413248407100e6e19c1079bc49b338d5c22eb87b431d80e30; _zcy_log_client_uuid=66244f30-1926-11ec-b10c-df0333dd97f0; districtCode=339900; districtName=%E6%B5%99%E6%B1%9F%E7%9C%81%E6%9C%AC%E7%BA%A7; aid=110101; acw_sc__v2=6146f96ef9b85a8716e8f209cefb6a8f01302853; ssxmod_itna=QqUx97PiqDqWqqBp4eTmIDR0fqDtzWWDgCpECx05pTeGzDAxn40iDtPoLBo6pxghi3YqUB7GhWzQAYcYNObriW3Kawmo4GLDmKDyKmcTeDxOq0rD74irDDxD3DbRdDSDWKD9zqi3DEnKGfDDoDYf6uDitD4qDBGhdDKqGg8uG=8wiUintYEkD4PE=DjTbD/RhbOA=K=PaKSdpuDB=OxBQljL6gGeDH0fET+Av2KYpQAGDKRBozKwGTQD4FmDo3fD3K0B4hyzDDG++jwAP3eD; ssxmod_itna2=QqUx97PiqDqWqqBp4eTmIDR0fqDtzWWDgCpEDnKfxuYDswzQDLQSB=TmrbgbTQqm5suA=0PGFAQTgjQqkbqSRsZ+tw4q+dEB7MQXHuImd7+nKyCOKqmd+cdS8sEi0cbFBRBYwLx7vThO/Te+iRGOQixMAhI9Cie0KxQ4YYUy8qoCQ+GEeQwOWGQerdQ4Ie=Mi8GK2baPee=AGZ=QYqajRCbURevpCBpaxSXZYqnWokomDcF=Ob0SbSXa237pg+rIDfdHDboskddI92aH0OOjhOlnPVMRu7Rpy6=Xh9t3engAweo5RcCI0dc6jRhh2gm/idv=Drg=exNHD34R=p2jj=2d8rq2j9iqfOdo8XMCiiReVP6i/Np1bMQ==SrIxP+=GTz+/nm/a=6Gungrx+T=+T4pELa=q2pdEI0QDqBXaP+ixXhnf0ix+pYRiqiO=VoAfKLgAmooAQ65vGp1bxshpwjQIP3EZ5EmeRrwpb3nbHGBYE6El+m3WL1RfyYfv3B/+oS4FbmeG100nWIBda2+DU6RS=C76BxmrG4DQKx7A8Xq=Khtfxx/xE5bmi=hCiv7Mr+e/KxXAO+Wi4lq8AoHW0o0RKlRDB402+0hI4lDDFqD+2DxD===',
        # 'Cookie':'_zcy_log_client_uuid=aa283490-147a-11ec-856c-c5f08e71bafa; _uab_collina=163152776162785474582096; aid=110101; UM_distinctid=17bdeae1daee-0af1e7f42813ab-3a674704-e1000-17bdeae1dafdb; districtCode=330102; districtName=%E4%B8%8A%E5%9F%8E%E5%8C%BA; SESSION=N2I1OTQyOTMtZDM0OS00MWQ0LTkzOGUtNWRkODFlN2Y1YzIx; acw_sc__v2=6141a54393032d41718f93ded31378efea1a312d; ssxmod_itna=QqUx2DcDRGDQExBPGKEx7uDqROQ5HYDBjPEW8D0HbeGzDAxn40iDtPPNo9790nY+i35q+7i2UWeWnYaxrEUn7TfIlmDB3DEx06x3+Y34GGfxBYDQxAYDGDDPDo2PD1D3qDkD7h6CMy1qGWDm4sDYvFDQHGe4DFc2IOP4i7DDyd8x07YRKDeEahchgCq0ExK0KD9hYDsh0f=0KpjS8qM2oEIKw4eDGdQ2Lx=nDXkC2PTY73Ix0kdq0OyZAC7RMkZhvGIQr33QrelGWeq06xeBuK+jw7zCxx8YQxLMw4Kjh01kW/FDDWhspDD=; ssxmod_itna2=QqUx2DcDRGDQExBPGKEx7uDqROQ5HYDBjPEjxnKSpxgG4DsPKDLBiuSKqnReh6=7ZWiwBKhT9We5R8=A1CyDrnz8GyGvevYnGbL=e/pKy1Vj8iY48MfhDoM8K4XM4k+KbywZDR46XHz+2Hic29enQviV7BkMAntLEAO5IY1D9vwYKY1eO7Oz9ymhRnTMGH8I+H7f8q3DQF7DjKD+cGDD',
        'Content-Type': 'application/json;charset=UTF-8',
        'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36'

    }
    data = {"pageNo": '1', "pageSize": "50", "matchDirectPurchase": "false",
            "fcids": '237', "hasStock": "true",
            "deliveryCode": '110101', "excludedIds": [], "normal": '6'}
    if not response_text:
        url2 = 'https://www.zcygov.cn/front/index/search/search'
        response = requests.post(url=url2, headers=headers3, data=json.dumps(data))
        response_text = response.text
    # 重js中匹配出 arg1
    arg1 = re.search("arg1='([^']+)'", response_text).group(1)
    # print(arg1, '-------------111')
    # 参数生成
    s1 = get_unsbox(arg1)
    _0x4e08d8 = "3000176000856006061501533003690027800375"
    _0x12605e = get_hexxor(s1, _0x4e08d8)
    arg2 = 'acw_sc__v2=' + _0x12605e
    headers = {
        'user-agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36',
        'Origin': 'https://www.zcygov.cn',
        'Content-Type': 'application/json;charset=UTF-8',

    }
    headers['Cookie'] =  'aid=110101; districtCode=330103; '+ arg2
    return headers
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值