|
|
|
|
|
|
|
|
|
|
|
[悬赏]如何读取网页验证码?
醒醒~ 别以为10块就能搞定图片文字识别。 我已经教给你了如何分析网页和自动下载验证马图片的方法。 这tm都超过10块了~~ |
|
|
|
|
|
|
|
|
[翻译]玩命的销售日志 2017.10.23 - 翻译《Prime in P》并实现AKS
3deK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3I4X3k6q4)9J5k6i4g2U0K9g2)9J5k6h3g2V1N6g2)9J5c8W2)9%4c8h3N6G2K9r3I4C8k6g2)9J5c8Y4m8&6N6r3S2G2L8X3I4A6j5Y4y4Q4x3V1k6Q4x3U0y4Y4L8i4m8&6 gmpy 支持所有3.x版本 |
|
|
[悬赏]如何读取网页验证码?
先在网页源码里获得 seccode xxxxxxxx <span id="seccode_cSpFBrKK"></span>
<script type="text/javascript" reload="1">updateseccode('cSpFBrKK', '<div class="rfm"><table><tr><th><span class="rq">*</span><sec>: </th><td><sec><br /><sec></td></tr></table></div>', 'member::register');</script>
跟踪updateseccode函数 function _updateseccode(idhash, tpl, modid) {
if(!$('seccode_' + idhash)) {
return;
}
if(tpl) {
seccheck_tpl[idhash] = tpl;
}
var id = 'seccodejs_' + idhash;
var src = 'misc.php?mod=seccode&action=update&idhash=' + idhash + '&' + Math.random() + '&modid=' + modid;
if($(id)) {
document.getElementsByTagName('head')[0].appendChild($(id));
}
var scriptNode = document.createElement("script");
scriptNode.type = "text/javascript";
scriptNode.id = id;
scriptNode.src = src;
document.getElementsByTagName('head')[0].appendChild(scriptNode);
}
这个函数在 head 插入个 script 元素,scr属性是: if($('seccode_cSpFBrKK')) {
if(!$('vseccode_cSpFBrKK')) {
var sectpl = seccheck_tpl['cSpFBrKK'] != '' ? seccheck_tpl['cSpFBrKK'].replace(/<hash>/g, 'codecSpFBrKK') : '';
var sectplcode = sectpl != '' ? sectpl.split('<sec>') : Array('<br />',': ','<br />','');
var string = '<input name="seccodehash" type="hidden" value="cSpFBrKK" /><input name="seccodemodid" type="hidden" value="member::register" />' + sectplcode[0] + '验证码' + sectplcode[1] + '<input name="seccodeverify" id="seccodeverify_cSpFBrKK" type="text" autocomplete="off" style="ime-mode:disabled;width:100px" class="txt px vm" onblur="checksec(\'code\', \'cSpFBrKK\', 0, null, \'member::register\')" />' +
' <a href="javascript:;" onclick="updateseccode(\'cSpFBrKK\');doane(event);" class="xi2">换一个</a>' +
'<span id="checkseccodeverify_cSpFBrKK"><img src="' + STATICURL + 'image/common/none.gif" width="16" height="16" class="vm" /></span>' +
sectplcode[2] + '<span id="vseccode_cSpFBrKK">请输入下面动画图片中的字符<br /><img onclick="updateseccode(\'cSpFBrKK\')" width="100" height="30" src="misc.php?mod=seccode&update=67431&idhash=cSpFBrKK" class="vm" alt="" /></span>' + sectplcode[3];
evalscript(string);
$('seccode_cSpFBrKK').innerHTML = string;
} else {
var string = '请输入下面动画图片中的字符<br /><img onclick="updateseccode(\'cSpFBrKK\')" width="100" height="30" src="misc.php?mod=seccode&update=67431&idhash=cSpFBrKK" class="vm" alt="" />';
evalscript(string);
$('vseccode_cSpFBrKK').innerHTML = string;
}
seccheck_mobile2();
}
其中 img 元素的 src属性就是验证马图片的地址: 下载这个图片,就看到验证码了。 |
|
|
[求助]关于汇编指令xor的16进制数据
xor 汇编记号 是 一簇有异或功能的多个机器指令的代称。 "xor edx,ebx" 有2种汇编方式: 31 /r XOR r/m32,r32 对 r/m32 同 r32 执行“异或”运算 33 /r XOR r32,r/m32 对 r32 同 r/m32 执行“异或”运算 |
|
|
[分享]鱼C工作室资源打包合集
鱼C所有的教程都收集了? |
|
|
|
|
|
|
|
|
[悬赏]fiddler 抓包还原
''' python3 '''
import gzip
import base64
import io
gzdata = {"data":"H4sIAAAAAAAAAMSUW2\/iVhDHnweJ78BTX7Yczv2CtKpMfAjWgkGFjZ28IGzskE24RHZIk0\/fcZV2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\nMzEwNTQ=\n","length":"917","filename":"460030973556053_99000640210079_171015133330273_bob2_265_01.gz"}
with gzip.open(io.BytesIO(base64.decodebytes(bytes(gzdata["data"],'ascii'))))as gf:
try:
for i in gf:
print(i.decode()) #显示解压后的内容
except:pass
|
|
|
|
|
|
[悬赏]fiddler 抓包还原
呃~~ 悬赏给了谁? ''' python3 '''
import gzip
import base64
gzdata = {"data":"H4sIAAAAAAAAAMSUW2\/iVhDHnweJ78BTX7Yczv2CtKpMfAjWgkGFjZ28IGzskE24RHZIk0\/fcZV2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\nMzEwNTQ=\n","length":"917","filename":"460030973556053_99000640210079_171015133330273_bob2_265_01.gz"}
with open(gzdata['filename'],'w')as w:
w.write(gzdata["data"]) # 写入txt文件
with open(gzdata['filename']) as r,\
open('x_'+gzdata['filename'],'wb') as w:
base64.decode(r,w) #解码 base64
with gzip.open('x_'+gzdata['filename'])as gf:
try:
for i in gf:
print(i.decode()) #显示解压后的内容
except:pass
|
|
|
[悬赏]fiddler 抓包还原
FileInfo 1.0 EXP 3.39.12.AN.BN GSM+TD+WLAN 20171015133330330 99000640210079 24 E790A8E88E8EE4B8ADE5BF83 EX_H4 460030973556053 99000640210079 HM NOTE 1S 4.4.4 3.39.12.AN.BN 6 460 3 M8916EAAAANVZM-1.18170.1.26439.2,M8916EAAAANVZM-1.18170.1.26439.2 3.10.28-g1782916 7.6.8 e794b5e4bfa1e890a5e4b89ae58e85 com.ct.client 0 418166e5ffc74474b1c5209e7942d6fb EX_ALIVE4 20171015133330368 6 7 460 3 13995 6 24849 5377 90027 52 379 RCITY 20171015133330377 99000640210079 460030973556053 e6b2b3e58c97e79c81 e59490e5b1b1e5b882 SILENCE_PING4 20171015133317837 99000640210079 460030973556053 e6909ce78b900d0a 64 9f8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8$3i4K6u0W2M7$3!0Z5N6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0f1H3x3K6l9#2i4K6u0r3L8U0b7H3z5e0x3$3z5o6f1#2y4g2)9J5k6i4y4Z5N6r3#2D9 5 5 44 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -52 -7 -7 1 0.00000 0.00000 0 81 71 75 -1 192.168.1.167 36.98.99.226 6 0 192.168.1.167 SILENCE_DNS4 20171015133320257 99000640210079 460030973556053 e6909ce78b90 11bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4c8$3i4K6u0W2M7$3!0Z5N6g2)9J5k6h3y4G2L8g2)9J5c8U0t1H3x3e0f1H3x3K6l9#2i4K6u0r3L8U0b7H3z5e0x3$3z5o6f1#2y4g2)9J5k6i4y4Z5N6r3#2D9 220.181.90.8 192.168.1.1 1 255 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -52 -7 -7 1 0.00000 0.00000 0 81 69 75 -1 192.168.1.167 36.98.99.226 6 0 192.168.1.167 SILENCE_MEDIA6 20171015133326066 99000640210079 460030973556053 e6909ce78b90 e9eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8S2N6r3q4Q4x3X3g2$3L8$3c8Q4x3X3g2A6N6r3y4Q4x3X3g2U0L8W2)9J5c8W2)9K6c8X3E0Q4x3@1c8@1g2$3q4A6P5V1g2u0e0$3k6p5g2@1S2i4c8$3g2t1e0U0c8%4c8X3j5$3M7#2S2#2M7p5&6$3k6@1g2T1b7e0m8Z5b7h3c8i4h3i4k6W2g2%4l9@1e0V1c8n7h3q4g2&6h3h3E0Q4x3U0k6S2L8i4m8Q4x3@1u0S2i4K6y4p5h3r3k6s2c8X3A6H3b7$3#2Z5g2%4q4T1P5V1S2K6g2$3A6t1M7h3I4j5e0o6y4r3h3r3k6$3g2%4y4g2y4f1y4a6z5i4q4#2e0$3k6C8d9g2N6Z5x3i4c8X3K9o6k6j5N6$3@1@1x3@1&6y4b7h3y4Y4z5s2N6@1L8$3@1^5h3p5c8a6g2%4y4I4g2r3c8p5g2p5g2&6k6p5b7@1y4o6N6&6y4s2R3@1g2K6k6C8b7X3g2E0N6V1!0Z5e0h3y4x3h3Y4m8X3f1K6m8E0c8f1q4K9c8o6k6K6k6W2V1$3N6q4N6a6k6g2S2i4c8%4x3`. 1537886 647967 0 6 460 3 5a54455f41505f32343935 9c:a9:e4:24:e8:bf 13995 6 24849 5377 90027 52 379 -54 -7 -7 1 0.00000 0.00000 0 80 69 75 -1 192.168.1.167 36.98.99.226 6 220.181.90.8 1951677 0 0 192.168.1.167 -2.00 0.00 0.00 0 WIFI_DEV0 20171015133329518 ZTE_AP_2495 WPA/WPA2 PSK IEEE 802.11b/g/n 2437MHz 6 86 192.168.1.1 0.0.0.0 192.168.1.1 255.255.255.0 192.168.1.1 3600 seconds |
|
|
|
|
|
[翻译]英特尔®64和IA-32架构 软件开发者手册 第1卷: 基础架构 第3章 基本执行环境
5e1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4U0j5#2)9J5k6i4q4A6j5X3g2T1N6q4)9J5k6h3y4S2M7#2)9J5k6h3y4F1i4K6u0r3k6r3!0U0M7#2)9J5c8X3!0H3N6r3W2E0K9i4A6S2N6r3W2G2L8W2)9J5c8W2k6f1N6h3&6W2i4K6t1^5g2p5#2Q4x3U0W2Q4x3U0f1J5x3q4g2K6k6i4u0Q4x3U0N6K6i4K6t1#2x3U0m8s2N6h3W2V1k6g2)9J5c8X3#2W2M7X3N6W2k6q4m8J5L8$3A6W2j5%4c8K6i4K6u0r3j5h3&6S2L8s2W2*7k6i4u0Q4y4h3k6W2j5#2)9J5c8X3#2W2M7X3N6W2k6q4m8J5L8$3A6W2j5%4c8K6i4K6u0r3M7X3g2X3k6i4u0W2L8X3y4W2i4K6g2X3L8$3I4Z5i4K6u0r3N6$3S2K6K9$3W2F1i4K6g2X3K9r3!0E0k6i4m8S2k6$3g2Q4x3X3g2Z5N6r3@1`. 这里有些中文的词汇,也许有用~ |
|
|
[翻译]英特尔®64和IA-32架构 软件开发者手册 第1卷: 基础架构 第3章 基本执行环境
第二章看了,太多机翻的痕迹~ |
|
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
勋章
兑换勋章
证书
证书查询 >
能力值
支持!