阿里231 普通 滑块 分析

声明
本文章中所有内容仅供学习交流使用,不用于其他任何目的,抓包内容、敏感网址、数据接口等均已做脱敏处理,严禁用于商业用途和非法用途,否则由此产生的一切后果均与作者无关!
wx a15018601872 q 2766958292
逆向过程
部分python代码
import json
import random
import re

import execjs
import requests

headers = {
"Accept": "/",
"Accept-Language": "zh-CN,zh;q=0.9",
"Cache-Control": "no-cache",
"Connection": "keep-alive",
"Pragma": "no-cache",
"Sec-Fetch-Dest": "script",
"Sec-Fetch-Mode": "no-cors",
"Sec-Fetch-Site": "cross-site",
"Sec-Fetch-Storage-Access": "active",
"User-Agent": "",
"sec-ch-ua": "",
"sec-ch-ua-mobile": "?0",
"sec-ch-ua-platform": ""Windows""
}
url = "nocaptcha/analyze.jsonp"
cp = execjs.compile(open('./ali231.js','r',encoding='utf-8').read())
n = cp.call('get231',trace)
params = {
"n": n,
"asyn": "0",
"lang": "cn",
"v": "1",
"callback": "jsonp_097"
}
response = requests.get(url, headers=headers, params=params)

data = json.loads(re.findall('{.*}',response.text)[0])['result']
print(data)
value =data['value']
csessionid = data['csessionid']
print(response)
结果

总结
1.出于安全考虑,本章未提供完整流程,调试环节省略较多,只提供大致思路,具体细节要你自己还原,相信你也能调试出来。

posted @ 2025-05-08 09:41  kuangqilin  阅读(172)  评论(0)    收藏  举报