SNS什么的我是一直無愛的,這次蛋疼寫了個登錄開心網(kaixin001)并向所有好友發送站內消息的腳本。
開心網在登錄的時候做了一些處理,并不傳原始密碼,從js分析到的結果是:登錄時會生成一個隨機的key,然后用這個key和原始密碼進行xxtea加密,把加密后的結果再進行sha1加密。之后post這個key以及加密后的密碼進行登錄驗證。
以下是很簡陋的腳本內容:
#coding: utf-8 """ 開心網操作腳本 Author: piglei2007@gmail.com Version: 1.0 """ import re import urllib import urllib2 import random import hashlib import binascii import cookielib import simplejson from xxtea import encrypt LOGIN_URL = "http://www.kaixin001.com/login/login_api.php" LOGIN_KEY_URL = "http://www.kaixin001.com/" FRIEND_LIST_URL = "http://www.kaixin001.com/interface/suggestfriend.php" MESSAGE_SEND_URL = "http://www.kaixin001.com/msg/post.php" LOGIN_KEY_RE = re.compile(r"new\sEnLogin\('(.*?)'") class LoginError(Exception): """ 登錄失敗拋出異常 """ class Kaixin001User(object): """ 操作kaixin001,現有方法: get_login_key - 獲得用戶訪問登錄頁面時分配的加密key get_rpassword - 獲得經過xxtea以及sha1加密后的密碼 login - 登錄 get_friends_list - 獲得所有好友,返回字典格式 send_messages_to_all - 給所有好友發消息 """ def __init__(self, username, password): self.username = username self.password = password self.cj = cookielib.CookieJar() opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(self.cj)) opener.addheaders = [ ("User-agent", "Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.9.1) Gecko/20090704 Firefox/3.5"), ("Accept", "*/*"), ("Host", "www.kaixin001.com") ] urllib2.install_opener(opener) def get_login_key(self): """ 獲得登錄時候的加密key """ _temp = urllib2.urlopen(LOGIN_KEY_URL).read() key = LOGIN_KEY_RE.search(_temp).group(1) return key def login(self): """ 登錄 """ login_key = self.get_login_key() rpassword = self.get_rpassword(self.password, login_key) login_params = { 'email': self.username, 'encypt': login_key, 'rpasswd': rpassword, 'url': '/home/', 'ver': '1' } req = urllib2.Request(LOGIN_URL, urllib.urlencode(login_params), { "Referer": "http://www.kaixin001.com/" }) result = urllib2.urlopen(req).read() # 登錄失敗 if "errno" in result: raise LoginError("登錄失敗,請檢查用戶名或密碼") print "用戶 %s 登錄成功!" % self.username return 'ok' def get_friends_list(self): """ 獲得所有好友列表 """ get_friends_params = { 't': str(random.random()), 'type': 'all', } result = urllib2.urlopen(FRIEND_LIST_URL, urllib.urlencode(get_friends_params)).read() friends = simplejson.loads(result) print "你一共有 %s 位好友" % (len(friends) - 1) return friends def send_messages_to_all(self, message=''): """ 給所有好友發消息 """ friends = self.get_friends_list() send_params = { 'attachment_cancel': '', 'attachment_forwarding': '', 'attachment_random': '', 'code': '', 'content': message, 'forward_thread': '', 'rcode': '', 'service': '0', 'texttype': 'html', 'uids': ",".join([str(f['uid']) for f in friends]) } result = urllib2.urlopen(MESSAGE_SEND_URL, urllib.urlencode(send_params)) print result.geturl() print "消息發送成功" return 'ok' def get_rpassword(self, password, key): """ 獲得加密后的密碼 """ xxtea_pw = binascii.b2a_hex( encrypt(password, key) ) r_password = hashlib.sha1(xxtea_pw).hexdigest() return r_password if __name__ == '__main__': kxu = Kaixin001User( username = 'your_username', password = 'your_password' ) kxu.login() kxu.send_messages_to_all("This message is send by Python.")
這是腳本中需要用到的xxtea算法的python實現(xxtea.py):
import struct _DELTA = 0x9E3779B9 def _long2str(v, w): n = (len(v) - 1) << 2 if w: m = v[-1] if (m < n - 3) or (m > n): return '' n = m s = struct.pack('<%iL' % len(v), *v) return s[0:n] if w else s def _str2long(s, w): n = len(s) m = (4 - (n & 3) & 3) + n s = s.ljust(m, "\0") v = list(struct.unpack('<%iL' % (m >> 2), s)) if w: v.append(n) return v def encrypt(str, key): if str == '': return str v = _str2long(str, True) k = _str2long(key.ljust(16, "\0"), False) n = len(v) - 1 z = v[n] y = v[0] sum = 0 q = 6 + 52 // (n + 1) while q > 0: sum = (sum + _DELTA) & 0xffffffff e = sum >> 2 & 3 for p in xrange(n): y = v[p + 1] v[p] = (v[p] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff z = v[p] y = v[0] v[n] = (v[n] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[n & 3 ^ e] ^ z))) & 0xffffffff z = v[n] q -= 1 return _long2str(v, False) def decrypt(str, key): if str == '': return str v = _str2long(str, False) k = _str2long(key.ljust(16, "\0"), False) n = len(v) - 1 z = v[n] y = v[0] q = 6 + 52 // (n + 1) sum = (q * _DELTA) & 0xffffffff while (sum != 0): e = sum >> 2 & 3 for p in xrange(n, 0, -1): z = v[p - 1] v[p] = (v[p] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff y = v[p] z = v[n] v[0] = (v[0] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[0 & 3 ^ e] ^ z))) & 0xffffffff y = v[0] sum = (sum - _DELTA) & 0xffffffff return _long2str(v, True) if __name__ == "__main__": print decrypt(encrypt('Hello XXTEA!', '16bytelongstring'), '16bytelongstring')
更多文章、技術交流、商務合作、聯系博主
微信掃碼或搜索:z360901061

微信掃一掃加我為好友
QQ號聯系: 360901061
您的支持是博主寫作最大的動力,如果您喜歡我的文章,感覺我的文章對您有幫助,請用微信掃描下面二維碼支持博主2元、5元、10元、20元等您想捐的金額吧,狠狠點擊下面給點支持吧,站長非常感激您!手機微信長按不能支付解決辦法:請將微信支付二維碼保存到相冊,切換到微信,然后點擊微信右上角掃一掃功能,選擇支付二維碼完成支付。
【本文對您有幫助就好】元
