Commit 2f733bce authored by wang's avatar wang

开始按压验证码

parent 11530d13
......@@ -10,18 +10,18 @@
<body>
<script>
window._pxVid = '';
window._pxUuid = '982547c4-8cd5-11ee-9632-eaca3e4be6dc';
window._pxUuid = '57247f1d-8cd7-11ee-91c8-5f26c42eb752';
window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=982547c4-8cd5-11ee-9632-eaca3e4be6dc&v=&m=0';
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=57247f1d-8cd7-11ee-91c8-5f26c42eb752&v=&m=0';
document.head.appendChild(script);
script.onerror = function () {
script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=982547c4-8cd5-11ee-9632-eaca3e4be6dc&v=&m=0';
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=57247f1d-8cd7-11ee-91c8-5f26c42eb752&v=&m=0';
script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script);
};
......
......@@ -110,11 +110,11 @@ class PxBypass():
data_str = json.dumps(data, separators=(',', ':'))
else:
data_str = data
self.log.info(f'data_str {data_str}')
self.log.info(f"gen Payload {self.uuid}, {self.ts}")
# self.log.info(f'data_str {data_str}')
# self.log.info(f"gen Payload {self.uuid}, {self.ts}")
# payload = ctx.call('encodePayload', data_str, self.uuid, self.ts)
payload = PxUtils().encode_payload(payload=data_str, uuid=self.uuid, ts=self.ts)
self.log.info(f'payload {payload}')
# self.log.info(f'payload {payload}')
pc = self._gen_pc(data_str, f'{self.uuid}:{self.tag}:{self.ft}')
body = {
"appId": self.appId,
......@@ -128,9 +128,9 @@ class PxBypass():
"payload": payload,
}
body = self.update_sid_vid(body)
self.log.info(f'postBody {json.dumps(body)}')
# self.log.info(f'postBody {json.dumps(body)}')
response = self.session.post(self.pxUrl, headers=self.pxHeaders, data=body)
self.log.info(f'collector1 {response.text}')
# self.log.info(f'collector1 {response.text}')
resp = response.json()
self.parse_resp(resp)
cks = []
......@@ -555,16 +555,16 @@ class PxBypass():
if __name__ == '__main__':
url = "https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true"
url = "https://www.flyfrontier.com"
# while True:
try:
px = PxBypass(url)
t1 = '[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":4769,"PX12248":3600,"PX11385":1700553697276,"PX12280":1700553697286,"PX11496":"31fafcb0-8844-11ee-8d49-97ed9bc8f96f","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t2 = '31fafcb0-8844-11ee-8d49-97ed9bc8f96f:v8.7.2:317'
# print(px._gen_pc(t1, t2))
px.run()
# print(px._uuid())
# except KeyError:
# pass
except:
traceback.print_exc()
# time.sleep(1)
while True:
try:
px = PxBypass(url)
t1 = '[{"t":"PX12095","d":{"PX11645":"https://www.flyfrontier.com/","PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":4769,"PX12248":3600,"PX11385":1700553697276,"PX12280":1700553697286,"PX11496":"31fafcb0-8844-11ee-8d49-97ed9bc8f96f","PX12564":null,"PX12565":-1,"PX11379":false}}]'
t2 = '31fafcb0-8844-11ee-8d49-97ed9bc8f96f:v8.7.2:317'
# print(px._gen_pc(t1, t2))
px.run()
# print(px._uuid())
# except KeyError:
# pass
except:
traceback.print_exc()
time.sleep(1)
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment