Commit b04c279e authored by wangmingming's avatar wangmingming

解密payload

parent 512f3f06
...@@ -9,19 +9,19 @@ ...@@ -9,19 +9,19 @@
</head> </head>
<body> <body>
<script> <script>
window._pxVid = '52a1a3ba-8790-11ee-80b6-799a1e83fba8'; window._pxVid = '0d23fe7e-87ba-11ee-9670-cd751a140603';
window._pxUuid = 'fb9ffb66-2bb6-4a28-8116-f444d157181f'; window._pxUuid = '64247278-96aa-4772-a492-9186669dc741';
window._pxAppId = 'PXVb73hTEg'; window._pxAppId = 'PXVb73hTEg';
window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net'; window._pxHostUrl = 'https://collector-PXVb73hTEg.perimeterx.net';
window._pxCustomLogo = ''; window._pxCustomLogo = '';
window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js'; window._pxJsClientSrc = '//client.perimeterx.net/PXVb73hTEg/main.min.js';
window._pxFirstPartyEnabled = 'false'; window._pxFirstPartyEnabled = 'false';
var script = document.createElement('script'); var script = document.createElement('script');
script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=fb9ffb66-2bb6-4a28-8116-f444d157181f&v=52a1a3ba-8790-11ee-80b6-799a1e83fba8&m=0'; script.src = '//captcha.perimeterx.net/PXVb73hTEg/captcha.js?a=c&u=64247278-96aa-4772-a492-9186669dc741&v=0d23fe7e-87ba-11ee-9670-cd751a140603&m=0';
document.head.appendChild(script); document.head.appendChild(script);
script.onerror = function () { script.onerror = function () {
script = document.createElement('script'); script = document.createElement('script');
script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=fb9ffb66-2bb6-4a28-8116-f444d157181f&v=52a1a3ba-8790-11ee-80b6-799a1e83fba8&m=0'; script.src = 'https://captcha.px-cloud.net/PXVb73hTEg/captcha.js?a=c&u=64247278-96aa-4772-a492-9186669dc741&v=0d23fe7e-87ba-11ee-9670-cd751a140603&m=0';
script.onerror = window._pxDisplayErrorMessage; script.onerror = window._pxDisplayErrorMessage;
document.head.appendChild(script); document.head.appendChild(script);
}; };
......
...@@ -154,11 +154,11 @@ class PxBypass(): ...@@ -154,11 +154,11 @@ class PxBypass():
# time.sleep(2) # time.sleep(2)
# self._step_2(False) self._step_2(False)
# #
# # # if self.session.cookies.get_dict().get('_px2', None) == None: # # # if self.session.cookies.get_dict().get('_px2', None) == None:
# # time.sleep(2) # # time.sleep(2)
# self._step_3() self._step_3()
# time.sleep(2) # time.sleep(2)
self._token() self._token()
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment