python爬蟲-模擬微博登錄
- 2019 年 10 月 3 日
- 筆記
微博模擬登錄
這是本次爬取的網址:https://weibo.com/
一、請求分析
找到登錄的位置,填寫用戶名密碼進行登錄操作
看看這次請求響應的數據是什麼
這是響應得到的數據,保存下來
exectime: 8 nonce: "HW9VSX" pcid: "gz-4ede4c6269a09f5b7a6490f790b4aa944eec" pubkey: "EB2A38568661887FA180BDDB5CABD5F21C7BFD59C090CB2D245A87AC253062882729293E5506350508E7F9AA3BB77F4333231490F915F6D63C55FE2F08A49B353F444AD3993CACC02DB784ABBB8E42A9B1BBFFFB38BE18D78E87A0E41B9B8F73A928EE0CCEE1F6739884B9777E4FE9E88A1BBE495927AC4A799B3181D6442443" retcode: 0 rsakv: "1330428213" servertime: 1568257059
繼續完善登錄操作,輸入密碼,點擊登錄按鈕
經過分析呢,發現變化的參數就是sp
,nonce
,servetime
。servetime
就是當前的時間戳,我們只需找到其他兩個參數的生成方法就好了。對了su
這個參數是通過base64加密生成的
二、找到sp
,nonce
的加密方式
這次就不通過search關鍵字去找加密位置了
找到調用函數的位置,打上斷點,再進行登錄操作
經過js程式碼流程調試分析,最終我們找到了加密的位置
簡單介紹下怎麼調試js程式碼
找到sp
,nonce
的位置,通過python程式碼去實現它的加密方式
sp
它是通過rsa加密方式,加密生成的。rsa的具體用法可以通過百度找到。或者通過sha1加密生成。至於me.rsaPubkey
他怎麼得到的,他就是我們還沒有點擊登錄前,就發了一個請求,那個請求的響應數據就有它。如果你測試的次數多了的話,會發現這個值它是固定下來的。所以我們也可以直接去用,不用請求獲取。
nonce
:它呢也出現過在未點擊登錄前的那個請求響應的數據中,但是呢,我們點了幾次登錄,都未發現這個請求了。nonce
的值每次還不一樣。所以它肯定是本地js文件的某個函數生成,不用請求伺服器獲取。我們在這裡找到了nonce的生成函數
import random import rsa import hashlib from binascii import b2a_hex def get_nonce(n): result = "" random_str = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" for i in range(n): index = random.randint(0, len(random_str) - 1) result += random_str[index] return result def get_sp_rsa(password, servertime, nonce): key = "EB2A38568661887FA180BDDB5CABD5F21C7BFD59C090CB2D245A87AC253062882729293E5506350508E7F9AA3BB77F4333231490F915F6D63C55FE2F08A49B353F444AD3993CACC02DB784ABBB8E42A9B1BBFFFB38BE18D78E87A0E41B9B8F73A928EE0CCEE1F6739884B9777E4FE9E88A1BBE495927AC4A799B3181D6442443" pubkey = rsa.PublicKey(int(key, 16), int("10001", 16)) res = rsa.encrypt(bytes("" + "t".join([servertime, nonce]) + "n" + password,encoding="utf-8"), pubkey) return b2a_hex(res) def get_sp_sha1(password, servertime, nonce): res = hashlib.sha1(bytes("" + hashlib.sha1(bytes(hashlib.sha1(bytes(password, encoding="utf-8")).hexdigest(),encoding="utf-8")).hexdigest() + servertime + nonce,encoding="utf-8")).hexdigest() return res
三、響應數據
請求參數分析的差不多了,這次輸入正確的用戶名,密碼。查看響應的數據的是什麼。
打開fiddler,然後退出當前帳號,重新進行登錄操作。fiddler上面就會出現很多請求。找到需要的請求,看看響應內容
這樣做,每個響應都會set-cookie。所以照著上面的流程實現,標識登錄的cookie肯定能得到。之後的話,只要帶上這個cookie去做其他操作就行了。
最後附上程式碼
import requests, random, time, rsa, hashlib, base64, re, json from binascii import b2a_hex class WeiBo: def __init__(self): self.session = requests.Session() self.headers = { "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" } def login(self, account, password): api = "https://login.sina.com.cn/sso/login.php?client=ssologin.js(v1.4.19)" nonce = self._get_nonce() servertime = self._get_now_time() sp = self._get_sp_rsa(password, servertime, nonce) su = self._get_su(account) data = { "entry": "weibo", "gateway": "1", "from": "", "savestate": "7", "qrcode_flag": "false", "useticket": "1", "pagerefer": "https://login.sina.com.cn/crossdomain2.php?action=logout&r=https%3A%2F%2Fpassport.weibo.com%2Fwbsso%2Flogout%3Fr%3Dhttps%253A%252F%252Fweibo.com%26returntype%3D1", "vsnf": "1", "su": su, "service": "miniblog", "servertime": servertime, "nonce": nonce, "pwencode": "rsa2", "rsakv": "1330428213", "sp": sp, "sr": "1920*1080", "encoding": "UTF - 8", "prelt": "149", "url": "https://weibo.com/ajaxlogin.php?framelogin=1&callback=parent.sinaSSOController.feedBackUrlCallBack", "returntype": "META", } headers = self.headers.copy() headers.update({ "Host": "login.sina.com.cn", "Origin": "https://weibo.com", "Referer": "https://weibo.com/" }) response = self.session.post(api, headers=headers, data=data, allow_redirects=False) search_result = self._re_search("location.replace("(.*?)"", response.text) redirct_url = search_result and search_result.group(1) if not redirct_url: raise Exception("重定向url獲取失敗") response = self.session.get(redirct_url, headers=headers.update({ "Referer": "https://login.sina.com.cn/sso/login.php?client=ssologin.js(v1.4.19)" }), allow_redirects=False) search_result = self._re_search('"arrURL":(.*?)}', response.text) redirct_urls = search_result and search_result.group(1) if not redirct_urls: raise Exception("重定向url獲取失敗") redirct_url_list = json.loads(redirct_urls) userId = "" for url in redirct_url_list: response = self.session.get(url, headers=self.headers) if url.startswith("https://passport.weibo.com/wbsso/login"): userId = self._re_search('"uniqueid":"(.*?)"', response.text).group(1) if not userId: raise Exception("userId獲取失敗") user_details_url = "https://weibo.com/u/{}/home?wvr=5&lf=reg".format(userId) response = self.session.get(user_details_url, headers={ "Referer": "https://weibo.com/", "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36" }) if self._re_search(userId, response.text): print("登錄成功") print(self.session.cookies) else: print("登錄失敗") def _get_nonce(self): nonce = "" random_str = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" for i in range(5): index = random.randint(0, len(random_str) - 1) nonce += random_str[index] return nonce def _get_now_time(self): return str(int(time.time())) def _get_sp_rsa(self, password, servertime, nonce): key = "EB2A38568661887FA180BDDB5CABD5F21C7BFD59C090CB2D245A87AC253062882729293E5506350508E7F9AA3BB77F4333231490F915F6D63C55FE2F08A49B353F444AD3993CACC02DB784ABBB8E42A9B1BBFFFB38BE18D78E87A0E41B9B8F73A928EE0CCEE1F6739884B9777E4FE9E88A1BBE495927AC4A799B3181D6442443" pubkey = rsa.PublicKey(int(key, 16), int("10001", 16)) res = rsa.encrypt(bytes("" + "t".join([servertime, nonce]) + "n" + password, encoding="utf-8"), pubkey) return b2a_hex(res) def _get_sp_sha1(self, password, servertime, nonce): res = hashlib.sha1(bytes("" + hashlib.sha1(bytes(hashlib.sha1(bytes(password, encoding="utf-8")).hexdigest(), encoding="utf-8")).hexdigest() + servertime + nonce, encoding="utf-8")).hexdigest() return res def _get_su(self, account): return str(base64.b64encode(bytes(account, encoding="utf-8")), encoding="utf-8") def _re_search(self, pattern, html): return re.search(pattern, html, re.S) def test(self): self.login("18716758777", "123456") if __name__ == '__main__': wb = WeiBo() wb.test()