Commit 1a18d10e authored by wang's avatar wang

f9 ok

parent 7925694c
......@@ -2686,6 +2686,7 @@ try {
function oo(t) {
var r = qa;
var a = i;
console.log(t)
!Na["PX12573"] && (Na["PX12573"] = Ce("" + Math["floor"](t)));
}
function io() {
......
......@@ -9,19 +9,19 @@
</head>
<body>
<script>
window._pxVid = 'a00c865a-883c-11ee-9488-da4457dd0ef6';
window._pxUuid = '1ff0199e-2953-439e-9dbc-fa6528799c44';
window._pxVid = 'a2c1d73c-884d-11ee-ada5-d677706c2688';
window._pxUuid = 'd1e079d9-64c6-449b-97eb-d697d559c0aa';
window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=&u=1ff0199e-2953-439e-9dbc-fa6528799c44&v=a00c865a-883c-11ee-9488-da4457dd0ef6&m=0';
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=d1e079d9-64c6-449b-97eb-d697d559c0aa&v=a2c1d73c-884d-11ee-ada5-d677706c2688&m=0';
document.head.appendChild(script);
script.onerror = function () {
script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=&u=1ff0199e-2953-439e-9dbc-fa6528799c44&v=a00c865a-883c-11ee-9488-da4457dd0ef6&m=0';
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=d1e079d9-64c6-449b-97eb-d697d559c0aa&v=a2c1d73c-884d-11ee-ada5-d677706c2688&m=0';
script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script);
};
......
No preview for this file type
......@@ -65,7 +65,7 @@ class PxBypass():
prox = 'http://user-uni001-region-us-sessid-1111-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
prox = 'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:9000'
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
prox = 'http://127.0.0.1:8890'
prox = 'http://127.0.0.1:7890'
session.proxies = {
'http': prox,
'https': prox,
......@@ -109,7 +109,7 @@ class PxBypass():
else:
data_str = data
self.log.info(f'data_str {data_str}')
self.log.info(f"gen Payload {self.uuid}, {self.ts}")
payload = ctx.call('encodePayload', data_str, self.uuid, self.ts)
self.log.info(f'payload {payload}')
pc = self._gen_pc(data_str, f'{self.uuid}:{self.tag}:{self.ft}')
......@@ -137,7 +137,9 @@ class PxBypass():
cks.append(f'{k}={v}')
self.log.info('; '.join(cks))
self.inc()
self.performanceNow = int(time.time() * 1000 - self.startTs)
self.performanceNow += int(time.time() * 1000 - self.startTs)
self.px12280 = self.startTs2 + self.performanceNow
def run(self):
......@@ -145,22 +147,21 @@ class PxBypass():
self.seq = 0
self.rsc = 1
self._step_1()
self.seq += 1
self._step_11()
# self.seq += 1
# self._step_11()
# time.sleep(1.5)
self._step_2(True)
# time.sleep(2)
self._step_2(False)
# self._step_2(False)
#
# # # if self.session.cookies.get_dict().get('_px2', None) == None:
# # time.sleep(2)
self._step_3()
# time.sleep(2)
time.sleep(2)
self._token()
def _init(self):
......@@ -203,6 +204,7 @@ class PxBypass():
self.startTs = t1
self.startTs2 = t2
self.performanceNow = random.randint(2000, 3000)
self.px12280 = self.startTs2 + self.performanceNow
self.uuid = self.__uuid()
# "[{"t":"PX12095","d":{"PX11645":self.target_url,"PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":3781,"PX12248":3600,
# "PX11385":1698649702900,"PX12280":1698649702913,"PX11496":"1ce53d20-76f3-11ee-8971-a3e00c89b2ff","PX12564":null,"PX12565":-1,"PX11379":false}}]"
......@@ -250,7 +252,7 @@ class PxBypass():
# for k, v in self.session.cookies.get_dict().items():
# cks.append(f'{k}={v}')
# # resp = requests.post('http://127.0.0.1:59001/akamai/gen', json={
self.prox = f'http://user-uni001-region-us-sessid-{random.randint(1000, 5000)}-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# self.prox = f'http://user-uni001-region-us-sessid-{random.randint(1000, 5000)}-sesstime-5-keep-true:q39CEBTs5A5YQXor@pr.roxlabs.cn:4600'
# self.prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
cks = []
for k, v in self.cookies.items():
......@@ -259,8 +261,8 @@ class PxBypass():
cks.append(f'{k}={v}')
print('; '.join(cks))
url = 'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
response = requests.post('http://52.52.23.116/tls/forward',
# response = requests.post('http://127.0.0.1:58000/tls/forward',
# response = requests.post('http://52.52.23.116/tls/forward',
response = requests.post('http://127.0.0.1:58000/tls/forward',
json=dict(url=url, headers={
"authority": "booking.flyfrontier.com",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
......@@ -293,10 +295,11 @@ class PxBypass():
def _step_2(self, nn):
self.log.info(self.uuid)
self.log.info(f'performanceNow {self.performanceNow}')
# sid, vid,ts, num1 ,num2,str1, uuid
data_str = ctxStep2.call('genPayload2', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid,
self.startTs, self.startTs2,self.performanceNow, nn)
self.startTs, self.startTs2, self.performanceNow, self.px12280, nn)
data = json.loads(data_str)
# data_str2 = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
......@@ -340,10 +343,13 @@ class PxBypass():
return data
def _step_3(self):
self.log.info(f'performanceNow {self.performanceNow}')
# sid, vid,ts, num1 ,num2,str1, uuid
data_str = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid, self.performanceNow)
# genPayload4(url, sid, vid, ts, num1, num2, str1, uuid, startTs, startTs2, performanceNow, px11280, n)
data_str = ctxStep2.call('genPayload4', self.target_url, self.sid, self.vid, self.ts, self.num1,
self.num2,
self.str1, self.uuid,self.startTs, self.startTs2, self.performanceNow, self.px12280)
self.do_collector(data_str)
......@@ -421,9 +427,8 @@ if __name__ == '__main__':
# while True:
try:
px = PxBypass(url)
t1 = '[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":2839,"PX12248":3600,"PX11385":1700206931539,"PX12280":1700206931543,"PX11496":"d17e7c10-851c-11ee-8b6a-39050a20a12c","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t2 = 'd17e7c10-851c-11ee-8b6a-39050a20a12c:v8.7.2:317'
t1 = '[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":4769,"PX12248":3600,"PX11385":1700553697276,"PX12280":1700553697286,"PX11496":"31fafcb0-8844-11ee-8d49-97ed9bc8f96f","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t2 = '31fafcb0-8844-11ee-8d49-97ed9bc8f96f:v8.7.2:317'
# print(px._gen_pc(t1, t2))
px.run()
# except KeyError:
......
This diff is collapsed.
......@@ -8,7 +8,9 @@ session = tls_client.Session(client_identifier='chrome_112')
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
cks = '_gcl_au=1.1.2022448120.1700472695; _ga=GA1.1.1937265584.1700472696; _uetsid=99538020878711ee80e79d4a6eaeab61; _uetvid=99537a90878711eeb031fbf9ed72ae51; pxcts=99918b7c-8787-11ee-b232-c7adea99781c; _pxvid=99917e25-8787-11ee-b232-a19e84f82da8; wisepops_visits=%5B%222023-11-20T09%3A31%3A35.370Z%22%5D; _pin_unauth=dWlkPU5tSXpaR0V4TlRndFpERTNNaTAwTjJZNUxUbG1OalV0WmpSaU5tUXpNbVF3TUdRMg; _px2=eyJ1IjoiOTkwYjY2YTAtODc4Ny0xMWVlLTkyNDMtOTNmMGVhNmM3MTUwIiwidiI6Ijk5OTE3ZTI1LTg3ODctMTFlZS1iMjMyLWExOWU4NGY4MmRhOCIsInQiOjYyMDIzMzg4MDAwNywiaCI6IjU0NzJiYWIxMjg2NjExODM1MjZjZDYzYjEwMGFlNjExNDAyNGZiMTJhNTRiY2VhYjk5NmYyY2Y2NjM4NzU0YjIifQ==; _tt_enable_cookie=1; _ttp=MkrQi_4SujhzWrPe_TAwCaNiXH2; wisepops=%7B%22csd%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A%7B%22dc%22%3A1%2C%22d%22%3A1700472698738%7D%7D%2C%22sub%22%3A0%2C%22ucrn%22%3A41%2C%22cid%22%3A%2278471%22%2C%22v%22%3A4%2C%22bandit%22%3A%7B%22recos%22%3A%7B%7D%7D%7D; wisepops_session=%7B%22arrivalOnSite%22%3A%222023-11-20T09%3A31%3A35.370Z%22%2C%22mtime%22%3A1700472698739%2C%22pageviews%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A0%7D%2C%22bars%22%3A%7B%7D%2C%22sticky%22%3A%7B%7D%2C%22countdowns%22%3A%7B%7D%2C%22src%22%3Anull%2C%22utm%22%3A%7B%7D%2C%22testIp%22%3Anull%7D; _up=1.2.115365150.1700472700; _ga_P2WLKWBNNW=GS1.1.1700472695.1.0.1700472703.52.0.0'
cks = '_pxvid=b61af38b-884d-11ee-a469-53cc9d07f922; pxcts=b61b06e0-884d-11ee-a469-ada452dc5d96; _px2=eyJ1IjoiODAxNDhmOGQtNDhhZi00MTkxLWE3OTctZGJmMWFlNTY3NTQ3IiwidiI6ImI2MWFmMzhiLTg4NGQtMTFlZS1hNDY5LTUzY2M5ZDA3ZjkyMiIsInQiOjE3MDA1NTgwODUxNzgsImgiOiJiY2U2MjhjODk3ODYyYzI3YzQzZWIxNjNiNTVmM2YyYWQ1NDllZGJmMGQ4YjFhMjVjZmIzNDU2YTA2ZDI1ZGZkIn0=; pxcts=b61b06e0-884d-11ee-a469-ada452dc5d96; _px2=eyJ1IjoiODAxNDhmOGQtNDhhZi00MTkxLWE3OTctZGJmMWFlNTY3NTQ3IiwidiI6ImI2MWFmMzhiLTg4NGQtMTFlZS1hNDY5LTUzY2M5ZDA3ZjkyMiIsInQiOjE3MDA1NTgwODUxNzgsImgiOiJiY2U2MjhjODk3ODYyYzI3YzQzZWIxNjNiNTVmM2YyYWQ1NDllZGJmMGQ4YjFhMjVjZmIzNDU2YTA2ZDI1ZGZkIn0='
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment