Article From:https://segmentfault.com/q/1010000011119575
Question:

Want to use Python to simulate login http://youku.com/, in the two parameter card master, do not know how to generate. Like figures (UA and jsToken):

In the http://aeu.alicdn.com/ctl/ctl.js can see the two parameters generated code (getUA, getUmidToken), helpless JS encryption, personal talent can not understand the shallow:

It is also found that when the page is loaded, it will request: https://ynuf.alipay.com/servi… And return to the result with a TN, which seems to be consistent with the jsToken. But, when this um.json is requested, it will be passedA data parameter does not know the generating logic of this data:

This information is probably seen at the moment. The trouble front-end God can point your finger again! Help explain the specific generation logic of the parameters, or give an unencrypted js, if you’ve studied it before, give an analog login code.
(The information is a little bit more, and it can’t be seen enough.

Answer 0:

Log in with Python selenium

Answer 1:

Brother, it’s like passwords are transmitted in plaintext
Plus some validation is to prevent malicious testing interface like you give your home bank card password to me, you do not report to the police.

Answer 2:

I studied selenium today. It is quite powerful, and it is more convenient to use. Then, the biggest drawback is that it is too slow, because the pages need to be loaded useless. PhantomJS is also not Chrome/FireFox convenient to use.
Thank you all! Later to crack the login parameters, and then update!

Leave a Reply

Your email address will not be published. Required fields are marked *