demo.py 2.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. # from curl_cffi import requests
  2. #
  3. # import requests
  4. # import execjs
  5. # import json
  6. #
  7. # requests = requests.Session()
  8. #
  9. # with open('逆向.js', encoding='utf-8') as f:
  10. # js = f.read()
  11. # ctx = execjs.compile(js)
  12. #
  13. #
  14. # headers = {
  15. # "accept": "*/*",
  16. # "accept-language": "zh-CN,zh;q=0.9",
  17. # "cache-control": "no-cache",
  18. # "content-type": "text/plain;charset=UTF-8",
  19. # "origin": "https://booking.jetstar.com",
  20. # "pragma": "no-cache",
  21. # "priority": "u=1, i",
  22. # "referer": "https://booking.jetstar.com/",
  23. # "sec-ch-ua": "\"Google Chrome\";v=\"135\", \"Not-A.Brand\";v=\"8\", \"Chromium\";v=\"135\"",
  24. # "sec-ch-ua-mobile": "?0",
  25. # "sec-ch-ua-platform": "\"Windows\"",
  26. # "sec-fetch-dest": "empty",
  27. # "sec-fetch-mode": "cors",
  28. # "sec-fetch-site": "same-origin",
  29. # "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36"
  30. # }
  31. #
  32. #
  33. # # akm js file url
  34. # # url = "https://www.jetstar.com/RGa75acATohb/xCwZta/rbnL7W/9J7Vz2pzzSVwGEXE/YxU3A31SAw/chwnU/DkTD0s"
  35. # url = "https://booking.jetstar.com/MkuYlo/pcp/LD0/PPluEQ/1ik7QcJffXbmL53i/QTcvXmg7/KS5kC3N/VRQcB"
  36. #
  37. # data = {
  38. # 'sensor_data': ctx.call('encrypt1')
  39. # }
  40. # data = json.dumps(data, ensure_ascii=False)
  41. # response = requests.post(url, headers=headers,
  42. # verify=False,
  43. # data=data,
  44. # impersonate='chrome110' # 不指定 impersonate 时,TLS 指纹是 curl 原生的,而非浏览器指纹(依旧过不了检测)。需显式设置该参数以绕过 TLS 指纹检测
  45. # )
  46. #
  47. # print(response.text)
  48. #
  49. # bmsz = response.cookies.get_dict()['bm_sz']
  50. # print('bmsz =>', bmsz)
  51. #
  52. #
  53. # data2 = {
  54. # "sensor_data": ctx.call('encrypt2', bmsz)
  55. # }
  56. #
  57. # data2 = json.dumps(data2)
  58. # # print(data2)
  59. # response2 = requests.post(url, headers=headers, data=data2, verify=False,
  60. # impersonate='chrome110'
  61. # )
  62. # print(response2.text)
  63. # print(response2.status_code)
  64. # print(response2.cookies.get_dict())
  65. #
  66. #
  67. # import requests
  68. # # 隧道域名:端口号
  69. # # tunnel = "l716.kdltps.com:15818"
  70. # tunnel = "l716.kdltps.com:15818"
  71. #
  72. # # 用户名密码方式
  73. # username = "t14669095435186"
  74. # password = "cle082qz"
  75. # proxies = {
  76. # "http": "http://%(user)s:%(pwd)s@%(proxy)s/" % {"user": username, "pwd": password, "proxy": tunnel},
  77. # "https": "http://%(user)s:%(pwd)s@%(proxy)s/" % {"user": username, "pwd": password, "proxy": tunnel}
  78. # }
  79. # print(requests.get('https://myip.ipip.net/', proxies=proxies).text)
  80. # print(requests.get('https://tls.peet.ws/api/all', proxies=proxies).text)
  81. # 113.14.208.206
  82. # 0149f47eabf9a20d0893e2a44e5a6323
  83. # 0149f47eabf9a20d0893e2a44e5a6323
  84. # 0149f47eabf9a20d0893e2a44e5a6323