神剑山庄资源网 Design By www.hcban.com
经过倒腾12306的登录,还是实现了,请求头很重要...各位感兴趣的可以继续写下去.....
import sys import time import requests from PIL import Image import json import os import Headers import SessionUtil import UrlUtils class Ticket(object): def __init__(self): self.answer = { "1": "40,40", "2": "110,40", "3": "180,40", "4": "260,40", "5": "40,120", "6": "110,120", "7": "180,120", "8": "260,120", } self.answer_code='' self.tk = '' def getDEVICEID(self): r = requests.get(UrlUtils.DEVICE_url, headers=Headers.BaseHead).text try: dic = json.loads(r[18:-2].replace(" ", "")) except Exception: return "" return dic # 初始化 获取设备id 设置为cookie 必须 def initialize(self): dic = self.getDEVICEID() if dic == "": print("网络获取指纹失败!使用默认id") RAIL_EXPIRATION = "1576651914389" RAIL_DEVICEID = "lBJStCNl0YGo_HVkGtwOo2LWziXcwzpIk5gc2vAILNYdRfaeZ04nJtZ1JZwgQIssMDksn10rAz6Hz-bekeufhAusaKJId8f2BCg05ocgrzc8-chv8h4IB-lQ9H04XjLXr2fbnHw-SLZga3PewEfgPz2s-mhp7NAz" else: print("网络获取指纹成功!") RAIL_EXPIRATION = dic["exp"] RAIL_DEVICEID = dic['dfp'] SessionUtil.setCookie("RAIL_EXPIRATION", RAIL_EXPIRATION) SessionUtil.setCookie("RAIL_DEVICEID", RAIL_DEVICEID) def conf(self): res = SessionUtil.session.post(url=UrlUtils.Conf_url, data=None, headers=Headers.ConFHeader) def uamtkstatic(self): data = { 'appid': 'otn' } SessionUtil.session.post(url=UrlUtils.UamtkStatic_url, data=data, headers=Headers.UamtkStaticHead) def get_img_code(self): try: img = SessionUtil.session.get(url=UrlUtils.Down_mg_url, headers=Headers.BaseHead).content with open('code.jpg', 'wb') as f: f.write(img) except Exception: print("下载图片错误! 等待重试~~") time.sleep(1) self.get_img_code() def check_img(self): try: Image.open('code.jpg').show() except Exception: time.sleep(2) Image.open('code.jpg').show() print("+---1-------+----------+----------+----------+") print("| 1 | 2 | 3 | 4 |") print("|----------|----------|----------|----------|") print("| 5 | 6 | 7 | 8 |") print("+----------+----------+----------+----------+") input_code = input("请在1—8中选择输入验证图片编号,以半角','隔开。(例如:1,3,5):") answer_code = '' try: for i in input_code.split(','): answer_code += ',' + self.answer[i] if (i is not input_code[0]) else self.answer[i] except Exception as e: print('输入错误请重新输入!') self.check_img() data = { 'answer': answer_code, 'rand': 'sjrand', 'login_site': 'E', } response = SessionUtil.session.get(url=UrlUtils.Check_img_url, params=data, headers=Headers.BaseHead, ) check_result = json.loads(response.text) print(check_result) try: if check_result['result_code'] == '4': print('*' * 20 + '验证码正确' + '*' * 20) self.answer_code=answer_code else: self.get_img_code() self.check_img() except Exception: self.get_img_code() self.check_img() # 校验密码正确 def login(self, answer_code): user = '' password = '' try: with open("user.conf", "r", encoding="utf-8") as f: user = f.readline().strip().replace("[", '').replace("]", '').replace("name=", '') password = f.readline().strip().replace("[", '').replace("]", '').replace("pwd=", '') if user == "" or password == "": raise Exception except Exception: user = input("账号____:") password = input("密码____:") formdata = { 'username': user, 'password': password, 'appid': 'otn', 'answer': answer_code } login_result = SessionUtil.session.post(url=UrlUtils.Login_url, data=formdata, headers=Headers.BaseHead) login_result.encoding = 'utf-8' login_result = login_result.json() print(login_result) if login_result["result_code"] != 0: #{'result_message': '登录名不存在。', 'result_code': 1} sys.exit(0) # 二次校验 def userLogin(self): # 获取一系列的cookie值才能真正的登录成功 response = SessionUtil.session.get(url=UrlUtils.UserLogin_url, headers=Headers.UserLoginHead) # 更新JSESSIONID route response = SessionUtil.session.get(url=UrlUtils.Redirect_UserLogin_Url, headers=Headers.RedirectHead) def uamtk(self): # 获取 tk 下一个请求需要提交 tk 值 data = {'appid': 'otn'} uamtk_page = SessionUtil.session.post(url=UrlUtils.Uamtk_url, data=data, headers=Headers.UamtkHeader) uamtk_page.encoding = 'utf-8' try: result = uamtk_page.json() print(result) if result['result_code'] != 0: raise Exception(result['result_message']) tk = result['newapptk'] self.tk = tk except Exception: print("获取tk失败!") print("重试") self.run() def Uamauthclient(self): data = {'tk': self.tk} response = SessionUtil.session.post(url=UrlUtils.Uamauthclient_url, data=data, headers=Headers.UamauthclientHeader) res = response.text try: dic = json.loads(res) print(dic) print(dic["username"] + ",欢迎登录!") except: print("登录失败!") self.run() # '{"result_code":0,"result_message":"验证通过","username":"XXX","apptk":"36yslXHez3_68-LtHvhI61mZkranjdw6kT9j4UMwEqrw1w0"}' def saveCookie(self): SessionUtil.save_cookies("12306cookies.txt") def getInfo(self): try: re = SessionUtil.session.post("https://kyfw.12306.cn/otn/modifyUser/initQueryUserInfoApi", headers=Headers.UserInfoHead) print(re.text) except: print("获取失败") def run(self): self.initialize() self.conf() self.uamtkstatic() self.get_img_code() self.check_img() self.login(self.answer_code) self.userLogin() self.uamtk() self.Uamauthclient() self.saveCookie() self.conf() self.getInfo() if __name__ == '__main__': t = Ticket() result = "": try: with open("12306cookies.txt", "r", encoding="utf-8") as fr: result = fr.read() except Exception: pass if result != "": SessionUtil.load_cookies("12306cookies.txt") t.initialize() t.conf() t.uamtkstatic() t.userLogin() t.uamtk() t.Uamauthclient() t.getInfo() else: t.run()
Headers:
BaseHead = { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", "Host": "kyfw.12306.cn", "Referer": "https://kyfw.12306.cn/otn/resources/login.html" } UserLoginHead = { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", 'Content-Type': 'application/x-www-form-urlencoded', 'Referer': 'https://kyfw.12306.cn/otn/resources/login.html', 'Upgrade-Insecure-Requests': '1', 'Accept-Encoding': 'gzip, deflate, br', 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8', } RedirectHead = { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", 'Referer': 'https://kyfw.12306.cn/otn/resources/login.html', 'Upgrade-Insecure-Requests': '1', 'Accept-Encoding': 'gzip, deflate, br', 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8', } UamtkHeader = { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Referer': 'https://kyfw.12306.cn/otn/passport"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", "Host": "kyfw.12306.cn", 'Referer': r'https://kyfw.12306.cn/otn/passport"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", "Host": "kyfw.12306.cn", "Referer": "https://kyfw.12306.cn/otn/resources/login.html" } UamtkStaticHead = { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299", 'Content-Type': 'application/x-www-form-urlencoded; charset=UTF-8', 'Referer': 'https://kyfw.12306.cn/otn/resources/login.html', } UserInfoHead = { "Accept": "*/*", "Accept-Encoding": "gzip, deflate, br", "Accept-Language": "zh-CN,zh;q=0.9,en;q=0.8", "Cache-Control": "no-cache", "Connection": "keep-alive", "Content-Length": "0", "Host": "kyfw.12306.cn", "Origin": "https://kyfw.12306.cn", "Pragma": "no-cache", "Referer": "https://kyfw.12306.cn/otn/view/information.html", "Sec-Fetch-Mode": "cors", "Sec-Fetch-Site": "same-origin", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36", "X-Requested-With": "XMLHttpRequest", }
SessionUtil
import requests import urllib3 from http import cookiejar urllib3.disable_warnings() session = requests.Session() session.verify = False # 取消验证 SSL def setCookie(key,value): session.cookies.set(key,value) def removeCookies(key=None): session.cookies.set(key, None) if key else session.cookies.clear() def load_cookies(cookie_path="12306cookies.txt"): load_cookiejar = cookiejar.LWPCookieJar() load_cookiejar.load(cookie_path, ignore_discard=True, ignore_expires=True) load_cookies = requests.utils.dict_from_cookiejar(load_cookiejar) session.cookies = requests.utils.cookiejar_from_dict(load_cookies) def save_cookies(cookie_path="12306cookies.txt"): new_cookie_jar = cookiejar.LWPCookieJar(cookie_path) requests.utils.cookiejar_from_dict({c.name: c.value for c in session.cookies}, new_cookie_jar) new_cookie_jar.save(cookie_path, ignore_discard=True, ignore_expires=True)
UrlUtils
import time DEVICE_url= 'https://kyfw.12306.cn/otn/HttpZF/logdevice"https://kyfw.12306.cn/otn/index/initMy12306Api"[/mw_shl_code]
以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持。
神剑山庄资源网 Design By www.hcban.com
神剑山庄资源网
免责声明:本站文章均来自网站采集或用户投稿,网站不提供任何软件下载或自行开发的软件!
如有用户或公司发现本站内容信息存在侵权行为,请邮件告知! 858582#qq.com
神剑山庄资源网 Design By www.hcban.com
暂无python实现12306登录并保存cookie的方法示例的评论...
稳了!魔兽国服回归的3条重磅消息!官宣时间再确认!
昨天有一位朋友在大神群里分享,自己亚服账号被封号之后居然弹出了国服的封号信息对话框。
这里面让他访问的是一个国服的战网网址,com.cn和后面的zh都非常明白地表明这就是国服战网。
而他在复制这个网址并且进行登录之后,确实是网易的网址,也就是我们熟悉的停服之后国服发布的暴雪游戏产品运营到期开放退款的说明。这是一件比较奇怪的事情,因为以前都没有出现这样的情况,现在突然提示跳转到国服战网的网址,是不是说明了简体中文客户端已经开始进行更新了呢?
更新日志
2024年10月08日
2024年10月08日
- 《丁当 20首重量级歌曲 Fu Good 下一站天后 2CD》[WAV/分轨][650MB]
- 歌莉雅.2012-My.Voice.Story【环星】【FLAC分轨】
- 群星.1993-一曲成名·青春无悔【飞碟】【WAV+CUE】
- 刘德华.2000-爱无知(金装版)【NEWMELODY】【WAV+CUE】
- 许巍《时光漫步》1CD[FLAC/分轨][804.3MB]
- 群星《2024第一季度百度歌曲排行抖音榜top100》1CD[FLAC/分轨][2.3GB]
- 张柏芝《全新经验》[FLAC/分轨][450MB]
- 唐朝.2008-浪漫骑士【音乐家】【WAV+CUE】
- 张芸京.2016-失败的高歌【泡耳音乐】【WAV+CUE】
- 群星.1991-音乐工厂1·皇后大道东【音乐工厂】【WAV+CUE】
- 群星.1992-音乐工厂2·首都【音乐工厂】【WAV+CUE】
- 群星.1994-音乐工厂3·儿童乐园【音乐工厂】【WAV+CUE】
- 胡鸿钧.2021-ex:CHANGE【星梦娱乐】【WAV+CUE】
- 班得瑞原装进口《第一张新世纪专辑:仙境》1CD[APE/CUE分轨][292.3MB]
- 伍佰《摇滚教父 伍佰黄金精选 2CD》[WAV+CUE][990MB]