Commit dcf90d3d authored by wangmingming's avatar wangmingming

7777

parent 8cca164a
...@@ -39,13 +39,19 @@ headers = { ...@@ -39,13 +39,19 @@ headers = {
"origin": "https://www.jetblue.com", "origin": "https://www.jetblue.com",
"accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7" "accept-language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7"
} }
# tlss = [ 'chrome_103', 'chrome_104', 'chrome_105', 'chrome_106',
# 'firefox_102', 'firefox_104'
# Opera --> opera_89, opera_90
# 'safari_15_3', 'safari_15_6_1', 'safari_16_0',
# 'safari_ios_15_5', 'safari_ios_15_6', 'safari_ios_16_0',
# 'safari_ios_15_6'
# ]
lastHash = '' lastHash = ''
usedTime = 10 usedTime = 10
code = open('src.js', 'r').read() code = open('src.js', 'r').read()
for i in range(100): for i in range(100):
selectId = random.choice(list(envs)) selectId = random.choice(list(envs))
# selectId = 'ac22733c38ee66a568f17174' # selectId = '52df47fa8d71ad96bbffa979'
c = requests.get('https://www.jetblue.com/js/src/jb-74873.js').text c = requests.get('https://www.jetblue.com/js/src/jb-74873.js').text
m5 = md5(c) m5 = md5(c)
if m5 != lastHash and usedTime > 3: if m5 != lastHash and usedTime > 3:
...@@ -126,14 +132,15 @@ for i in range(100): ...@@ -126,14 +132,15 @@ for i in range(100):
} }
proxy = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{int(random.randint(10000, 11149))}' proxy = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{int(random.randint(10000, 11149))}'
# proxy = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@198.147.25.26:{int(random.randint(10000, 11149))}' # proxy = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@198.147.25.26:{int(random.randint(10000, 11149))}'
# proxy = 'http://user-unifflcc-region-us:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600' proxy = 'http://user-unifflcc-region-us:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
proxy = 'http://127.0.0.1:7890' # proxy = 'http://127.0.0.1:7890'
session = tls_client.Session(client_identifier='chrome_110') tlsV = f'chrome_{random.randint(105,113)}'
session = tls_client.Session(client_identifier=tlsV)
session.proxies = { session.proxies = {
'http': proxy, 'http': proxy,
'https': proxy, 'https': proxy,
} }
print(proxy) print(tlsV, proxy)
response = session.post(url, headers=headers, json=data) response = session.post(url, headers=headers, json=data)
# print(response.text) # print(response.text)
......
This source diff could not be displayed because it is too large. You can view the blob instead.
This source diff could not be displayed because it is too large. You can view the blob instead.
This source diff could not be displayed because it is too large. You can view the blob instead.
No preview for this file type
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment