Commit 512f3f06 authored by wang's avatar wang

f9 test

parent 3aefdccf
......@@ -4068,6 +4068,7 @@ try {
return Pc;
}
function Lc(t, e, n, r) {
console.log('set cookie', t, n)
var a = arguments["length"] > 4 && void 0 !== arguments[4] ? arguments[4] : kc();
try {
var o;
......
......@@ -9,19 +9,19 @@
</head>
<body>
<script>
window._pxVid = 'bac55d92-8700-11ee-9f8a-9543866dc52f';
window._pxUuid = 'eafe6719-4c1b-4282-9e44-85b59ebb26d2';
window._pxVid = '52a1a3ba-8790-11ee-80b6-799a1e83fba8';
window._pxUuid = 'fb9ffb66-2bb6-4a28-8116-f444d157181f';
window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=eafe6719-4c1b-4282-9e44-85b59ebb26d2&v=bac55d92-8700-11ee-9f8a-9543866dc52f&m=0';
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=fb9ffb66-2bb6-4a28-8116-f444d157181f&v=52a1a3ba-8790-11ee-80b6-799a1e83fba8&m=0';
document.head.appendChild(script);
script.onerror = function () {
script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=eafe6719-4c1b-4282-9e44-85b59ebb26d2&v=bac55d92-8700-11ee-9f8a-9543866dc52f&m=0';
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=fb9ffb66-2bb6-4a28-8116-f444d157181f&v=52a1a3ba-8790-11ee-80b6-799a1e83fba8&m=0';
script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script);
};
......
......@@ -131,10 +131,13 @@ class PxBypass():
resp = response.json()
self.parse_resp(resp)
cks = []
for k, v in self.cookies.items():
cks.append(f'{k}={v}')
for k, v in self.session.cookies.get_dict().items():
cks.append(f'{k}={quote(v)}')
cks.append(f'{k}={v}')
self.log.info('; '.join(cks))
self.inc()
self.performanceNow = int(time.time() * 1000 - self.startTs)
def run(self):
......@@ -151,12 +154,13 @@ class PxBypass():
# time.sleep(2)
self._step_2(False)
# # if self.session.cookies.get_dict().get('_px2', None) == None:
self._step_3()
# time.sleep(2)
# self._step_2(False)
#
# # # if self.session.cookies.get_dict().get('_px2', None) == None:
# # time.sleep(2)
# self._step_3()
time.sleep(2)
# time.sleep(2)
self._token()
def _init(self):
......@@ -179,7 +183,7 @@ class PxBypass():
"sec-fetch-user": "?1",
"upgrade-insecure-requests": "1",
"user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36",
}, allow_redirects=True)
}, allow_redirects=False)
self.log.info(f"初始化请求 res {res.status_code}")
self.params = {}
for k, v in self.session.cookies.items():
......@@ -198,12 +202,13 @@ class PxBypass():
t2 = t1 + random.randint(3, 12)
self.startTs = t1
self.startTs2 = t2
self.performanceNow = random.randint(2000, 3000)
self.uuid = self.__uuid()
# "[{"t":"PX12095","d":{"PX11645":self.target_url,"PX12207":0,"PX12458":"MacIntel","PX11902":0,"PX11560":3781,"PX12248":3600,
# "PX11385":1698649702900,"PX12280":1698649702913,"PX11496":"1ce53d20-76f3-11ee-8971-a3e00c89b2ff","PX12564":null,"PX12565":-1,"PX11379":false}}]"
data = [{"t": "PX12095",
"d": {"PX11645": self.target_url, "PX12207": 0, "PX12458": "MacIntel", "PX11902": 0,
"PX11560": random.randint(24846, 24846 * 2), "PX12248": 3600, "PX11385": t1, "PX12280": t2,
"PX11560": self.performanceNow, "PX12248": 3600, "PX11385": t1, "PX12280": t2,
"PX11496": self.uuid, "PX12564": None, "PX12565": -1,
# "PX11379": True
}}]
......@@ -250,6 +255,8 @@ class PxBypass():
cks = []
for k, v in self.cookies.items():
cks.append(f'{k}={v}')
for k, v in self.session.cookies.get_dict().items():
cks.append(f'{k}={v}')
print('; '.join(cks))
url = 'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
# response = requests.post('http://52.52.23.116/tls/forward',
......@@ -289,8 +296,16 @@ class PxBypass():
# sid, vid,ts, num1 ,num2,str1, uuid
data_str = ctxStep2.call('genPayload2', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid,
self.startTs, self.startTs2, nn)
self.do_collector(data_str)
self.startTs, self.startTs2,self.performanceNow, nn)
data = json.loads(data_str)
# data_str2 = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
# self.str1, self.uuid,
# self.startTs, self.startTs2, nn)
# data2 = json.loads(data_str2)
# data.extend(data2)
self.do_collector(data)
def _decode_resp(self):
a = int(self.tag.replace('v', '').replace('.', ''))
......@@ -328,7 +343,7 @@ class PxBypass():
# sid, vid,ts, num1 ,num2,str1, uuid
data_str = ctxStep2.call('genPayload3', self.target_url, self.sid, self.vid, self.ts, self.num1, self.num2,
self.str1, self.uuid)
self.str1, self.uuid, self.performanceNow)
self.log.info(f'data_str3 {data_str}')
self.do_collector(data_str)
......@@ -372,10 +387,11 @@ class PxBypass():
self.cookies.update({
'_px2': tmp[3]
})
elif '31536000' in i:
self.cookies.update({
'_pxvid': tmp[1]
})
self.log.info(f'px2_decode {base64.b64decode(tmp[3].encode()).decode()}')
# elif '31536000' in i:
# self.cookies.update({
# '_pxvid': tmp[1]
# })
else:
for i in resp['do']:
......
This diff is collapsed.
This diff is collapsed.
import random
import requests
import tls_client
session = tls_client.Session(client_identifier='chrome_112')
prox = f'http://unfflcc:76cc14-47b8dd-1f8ace-827836-0c740e@usa.rotating.proxyrack.net:{random.randint(10000, 13500)}'
cks = '_px2=eyJ1IjoiODE5ZWJlNjgtNTRlNS00ZGQ0LThkMjgtNmUzNTc0NjQ0N2M0IiwidiI6ImI5MzZiZWE5LTg2ZjctMTFlZS1iZTJmLWE5MjAxMjU4YjM5NiIsInQiOjE3MDA0MTEyMDI2NzcsImgiOiJkM2I1ZTFmNTA5YzRiZjc4ODYzZGEyYTYxNGE4NTY5NTZmMTRjY2MxYjRkZDAyYTJjMmI3YjgzNjQ3NzMyMzVhIn0%3D; _pxvid=b936bea9-86f7-11ee-be2f-a9201258b396; pxcts=b936cdac-86f7-11ee-be2f-fd126cfa4ec6'
cks = '_gcl_au=1.1.2022448120.1700472695; _ga=GA1.1.1937265584.1700472696; _uetsid=99538020878711ee80e79d4a6eaeab61; _uetvid=99537a90878711eeb031fbf9ed72ae51; pxcts=99918b7c-8787-11ee-b232-c7adea99781c; _pxvid=99917e25-8787-11ee-b232-a19e84f82da8; wisepops_visits=%5B%222023-11-20T09%3A31%3A35.370Z%22%5D; _pin_unauth=dWlkPU5tSXpaR0V4TlRndFpERTNNaTAwTjJZNUxUbG1OalV0WmpSaU5tUXpNbVF3TUdRMg; _px2=eyJ1IjoiOTkwYjY2YTAtODc4Ny0xMWVlLTkyNDMtOTNmMGVhNmM3MTUwIiwidiI6Ijk5OTE3ZTI1LTg3ODctMTFlZS1iMjMyLWExOWU4NGY4MmRhOCIsInQiOjYyMDIzMzg4MDAwNywiaCI6IjU0NzJiYWIxMjg2NjExODM1MjZjZDYzYjEwMGFlNjExNDAyNGZiMTJhNTRiY2VhYjk5NmYyY2Y2NjM4NzU0YjIifQ==; _tt_enable_cookie=1; _ttp=MkrQi_4SujhzWrPe_TAwCaNiXH2; wisepops=%7B%22csd%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A%7B%22dc%22%3A1%2C%22d%22%3A1700472698738%7D%7D%2C%22sub%22%3A0%2C%22ucrn%22%3A41%2C%22cid%22%3A%2278471%22%2C%22v%22%3A4%2C%22bandit%22%3A%7B%22recos%22%3A%7B%7D%7D%7D; wisepops_session=%7B%22arrivalOnSite%22%3A%222023-11-20T09%3A31%3A35.370Z%22%2C%22mtime%22%3A1700472698739%2C%22pageviews%22%3A1%2C%22popups%22%3A%7B%22429858%22%3A0%7D%2C%22bars%22%3A%7B%7D%2C%22sticky%22%3A%7B%7D%2C%22countdowns%22%3A%7B%7D%2C%22src%22%3Anull%2C%22utm%22%3A%7B%7D%2C%22testIp%22%3Anull%7D; _up=1.2.115365150.1700472700; _ga_P2WLKWBNNW=GS1.1.1700472695.1.0.1700472703.52.0.0'
url = 'https://booking.flyfrontier.com/Flight/InternalSelect?o1=DEN&d1=LAS&dd1=2023-11-30&ADT=1&umnr=false&mon=true'
response = session.post('http://52.52.23.116/tls/forward',
response = requests.post('http://52.52.23.116/tls/forward',
json=dict(url=url, headers={
"authority": "booking.flyfrontier.com",
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment