python實現的登入和操作開心網指令碼分享

來源:互聯網
上載者:User
SNS什麼的我是一直無愛的,這次蛋疼寫了個登入開心網(kaixin001)並向所有好友發送站內訊息的指令碼。

開心網在登入的時候做了一些處理,並不傳原始密碼,從js分析到的結果是:登入時會產生一個隨機的key,然後用這個key和原始密碼進行xxtea加密,把加密後的結果再進行sha1加密。之後post這個key以及加密後的密碼進行登入驗證。

以下是很簡陋的指令碼內容:

#coding: utf-8"""開心網操作指令碼Author: piglei2007@gmail.comVersion: 1.0"""import reimport urllibimport urllib2import randomimport hashlibimport binasciiimport cookielibimport simplejsonfrom xxtea import encryptLOGIN_URL = "http://www.kaixin001.com/login/login_api.php"LOGIN_KEY_URL = "http://www.kaixin001.com/"FRIEND_LIST_URL = "http://www.kaixin001.com/interface/suggestfriend.php"MESSAGE_SEND_URL = "http://www.kaixin001.com/msg/post.php"LOGIN_KEY_RE = re.compile(r"new\sEnLogin\('(.*?)'")class LoginError(Exception):  """  登入失敗拋出異常  """class Kaixin001User(object):  """  操作kaixin001,現有方法:      get_login_key - 獲得使用者訪問登入頁面時分配的加密key        get_rpassword - 獲得經過xxtea以及sha1加密後的密碼        login - 登入        get_friends_list - 獲得所有好友,返回字典格式        send_messages_to_all - 給所有好友發訊息  """    def __init__(self, username, password):    self.username = username    self.password = password    self.cj = cookielib.CookieJar()    opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(self.cj))    opener.addheaders = [      ("User-agent", "Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.9.1) Gecko/20090704 Firefox/3.5"),      ("Accept", "*/*"),      ("Host", "www.kaixin001.com")    ]    urllib2.install_opener(opener)      def get_login_key(self):    """    獲得登入時候的加密key    """    _temp = urllib2.urlopen(LOGIN_KEY_URL).read()    key = LOGIN_KEY_RE.search(_temp).group(1)    return key      def login(self):    """    登入    """    login_key = self.get_login_key()    rpassword = self.get_rpassword(self.password, login_key)    login_params = {      'email': self.username,      'encypt': login_key,      'rpasswd': rpassword,      'url': '/home/',      'ver': '1'          }    req = urllib2.Request(LOGIN_URL, urllib.urlencode(login_params), {      "Referer": "http://www.kaixin001.com/"    })    result = urllib2.urlopen(req).read()        # 登入失敗    if "errno" in result:      raise LoginError("登入失敗,請檢查使用者名稱或密碼")        print "使用者 %s 登入成功!" % self.username        return 'ok'    def get_friends_list(self):    """    獲得所有好友名單    """    get_friends_params = {      't': str(random.random()),      'type': 'all',        }    result = urllib2.urlopen(FRIEND_LIST_URL, urllib.urlencode(get_friends_params)).read()    friends = simplejson.loads(result)        print "你一共有 %s 位好友" % (len(friends) - 1)    return friends    def send_messages_to_all(self, message=''):    """    給所有好友發訊息    """    friends = self.get_friends_list()    send_params = {      'attachment_cancel': '',      'attachment_forwarding': '',      'attachment_random': '',      'code': '',      'content': message,      'forward_thread': '',      'rcode': '',      'service': '0',      'texttype': 'html',      'uids': ",".join([str(f['uid']) for f in friends])       }    result = urllib2.urlopen(MESSAGE_SEND_URL, urllib.urlencode(send_params))    print result.geturl()    print "訊息發送成功"    return 'ok'        def get_rpassword(self, password, key):    """    獲得加密後的密碼    """    xxtea_pw = binascii.b2a_hex( encrypt(password, key) )    r_password = hashlib.sha1(xxtea_pw).hexdigest()    return r_password  if __name__ == '__main__':  kxu = Kaixin001User(    username = 'your_username',    password = 'your_password'  )  kxu.login()  kxu.send_messages_to_all("This message is send by Python.")

這是指令碼中需要用到的xxtea演算法的python實現(xxtea.py):

import struct _DELTA = 0x9E3779B9  def _long2str(v, w):   n = (len(v) - 1) << 2   if w:     m = v[-1]     if (m < n - 3) or (m > n): return ''     n = m   s = struct.pack('<%iL' % len(v), *v)   return s[0:n] if w else s  def _str2long(s, w):   n = len(s)   m = (4 - (n & 3) & 3) + n   s = s.ljust(m, "\0")   v = list(struct.unpack('<%iL' % (m >> 2), s))   if w: v.append(n)   return v  def encrypt(str, key):   if str == '': return str   v = _str2long(str, True)   k = _str2long(key.ljust(16, "\0"), False)   n = len(v) - 1   z = v[n]   y = v[0]   sum = 0   q = 6 + 52 // (n + 1)   while q > 0:     sum = (sum + _DELTA) & 0xffffffff     e = sum >> 2 & 3     for p in xrange(n):       y = v[p + 1]       v[p] = (v[p] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff       z = v[p]     y = v[0]     v[n] = (v[n] + ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[n & 3 ^ e] ^ z))) & 0xffffffff     z = v[n]     q -= 1   return _long2str(v, False)  def decrypt(str, key):   if str == '': return str   v = _str2long(str, False)   k = _str2long(key.ljust(16, "\0"), False)   n = len(v) - 1   z = v[n]   y = v[0]   q = 6 + 52 // (n + 1)   sum = (q * _DELTA) & 0xffffffff   while (sum != 0):     e = sum >> 2 & 3     for p in xrange(n, 0, -1):       z = v[p - 1]       v[p] = (v[p] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[p & 3 ^ e] ^ z))) & 0xffffffff       y = v[p]     z = v[n]     v[0] = (v[0] - ((z >> 5 ^ y << 2) + (y >> 3 ^ z << 4) ^ (sum ^ y) + (k[0 & 3 ^ e] ^ z))) & 0xffffffff     y = v[0]     sum = (sum - _DELTA) & 0xffffffff   return _long2str(v, True)  if __name__ == "__main__":   print decrypt(encrypt('Hello XXTEA!', '16bytelongstring'), '16bytelongstring')
  • 聯繫我們

    該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

    如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

    A Free Trial That Lets You Build Big!

    Start building with 50+ products and up to 12 months usage for Elastic Compute Service

    • Sales Support

      1 on 1 presale consultation

    • After-Sales Support

      24/7 Technical Support 6 Free Tickets per Quarter Faster Response

    • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.