本帖最后由 wua0550 于 2011-2-27 00:51 编辑 POST /m=weblogin/login.ws HTTP/1.1
Accept: application/x-shockwave-flash, image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/msword, */*
Referer: https://secure.runescape.com/m=weblogin/loginform.ws?mod=www&ssl=0&dest=title.ws
Accept-Language: zh-cn
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Apache; .NET CLR 2.0.50727)
Host: secure.runescape.com
Content-Length: 69
Connection: Keep-Alive
Cache-Control: no-cache
Cookie: settings=wwGlrZHF5gKN6D3mDdihco3oPeYN2KFybL9hUUFqOvk; __utma=197813168.614786035.1298398024.1298398024.1298398143.2; __utmb=197813168.32.10.1298398143; __utmz=197813168.1298398024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); JXDOB=19810221; __utmc=197813168; spotnewsTabLatest=news3995
username=XXXXX@163.com&password=XXXXX&mod=www&ssl=0&dest=title.ws
上面是其中一次的抓包数据,下面是我写的post $url = "https://secure.runescape.com/m=weblogin/loginform.ws?mod=www&ssl=0&dest=title.ws"
$oHTTP = ObjCreate("Microsoft.XMLHTTP")
$oHTTP.Open("POST", $url, False)
$oHTTP.setRequestHeader("Content-Type", "application/x-www-form-urlencoded")
$oHTTP.setRequestHeader("Cache-Contro", "no-cache")
$oHTTP.setRequestHeader("Referer",$url )
$oHTTP.setRequestHeader("Cookie", "settings=wwGlrZHF5gKN6D3mDdihco3oPeYN2KFybL9hUUFqOvk; __utma=197813168.614786035.1298398024.1298398024.1298398143.2; __utmb=197813168.32.10.1298398143; __utmz=197813168.1298398024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); JXDOB=19810221; __utmc=197813168; spotnewsTabLatest=news3995")
$oHTTP.Send("username=XXXXX@163.com&password=XXXXX&mod=www&ssl=0&dest=title.ws")
$HTMLSource = $oHTTP.Responsetext
在用au3写post 提交时不能反回登陆后的页面,经过多次抓包分析得出,"__utmb="的值是变化的.
论谈里的牛人能帮忙找下"__utmb="的原型以及加密方法吗~~~深表感谢 |