Warning: file_get_contents(/data/phpspider/zhask/data//catemap/8/redis/2.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
使用wget模拟HTTP POST请求,并在按下按钮时发送令牌_Post_Httprequest_Recaptcha_Access Token_Bearer Token - Fatal编程技术网

使用wget模拟HTTP POST请求,并在按下按钮时发送令牌

使用wget模拟HTTP POST请求,并在按下按钮时发送令牌,post,httprequest,recaptcha,access-token,bearer-token,Post,Httprequest,Recaptcha,Access Token,Bearer Token,当我按下站点中的特定按钮时,我的浏览器会发送此HTTP POST请求: http://www.[SITE_NAME].gr/api/v%CE%BFte/0?articleId=12050&ip=176.58.193.38 &year=2020&memberIdentifier=1298122909ba7bcc742&extraCheck=month6&parity=228 &reToken=03AGdBq26SaJESTeQ-4fpP9WCjCTi

当我按下站点中的特定按钮时,我的浏览器会发送此HTTP POST请求:

http://www.[SITE_NAME].gr/api/v%CE%BFte/0?articleId=12050&ip=176.58.193.38
&year=2020&memberIdentifier=1298122909ba7bcc742&extraCheck=month6&parity=228
&reToken=03AGdBq26SaJESTeQ-4fpP9WCjCTiq9L7-iovGMc60lTlmMsbNI3Yru5tnaf6Gh5TYznx81VlTEiJgEwJsoT33ZefsP4iu4cggHJ-SNuH1aU84CTGxxSUo3oposI8JYb6KIPSvkq5pXMYs6UY_IgFYcbtiYKIkZj91NEiP1XHDMQmbwkMWt4sw1E5VW_NLGobYurub9kWFKCze37QYZtBKgo8lr3IJbc0AC-xE5kW5L8F5XHnA1XF58xv62zeewj855p-37qrga58tb9bb1ZKzLflYR5Ng_gQXKvsgbNVVY6Pf8GHTDH0udkIk-SSUMZemKo7w5mso-DcPeZDjhGvS7bRDn3DlunnJ3lyzAUcGikFpZ9IlvnmNxL_lcenVC-CmGXVXTktr2jwBqPTRKPqrH1bJjE60XxQ3G4Iy9TqOkugO6gYwJe8C6Nf9LE4SvLsZeMxYMGpVvQRruWAN0hu0Qx3B6MqpU8SnozX6RoRx-TAU1oLonQEEiFw
使用请求头:

Accept: application/json, text/plain, */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Content-Length: 0
Cookie: votedMonths=|; userID=1298122909ba7bcc742; userIp=176.58.193.38;cookieconsent_status=dismiss
Host: www.[HOST_NAME].gr
Origin: http://www.[HOST_NAME].gr
Referer: http://www.[HOST_NAME].gr/[PATH]
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0
Accept: */*
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Content-Length: 5504
Content-Type: application/x-protobuffer
Cookie: NID=204=ofPxva7iaCaWlOaboW6MUpk3FESwgbLEmt1la7ayb5VWzDOmmFtoU8tJjtpiLzE00Xd7_3Q0mraUr-3yWMiSwSlt3RG9E3z-lDTvgrQ0OMvPO95MVvYxGlgbutVQb452diLLOzsHBcyMfMK4lTv6JN0ZX-MEf5WPcaifkZJlcMqF5k-P4BVgbeP6q0dPJ8kljzxl52dNsS1Z28OR_ssZz5AIvbB3AY7IlHQkpXDOZg; CONSENT=YES+GR.el+V12+BX; 1P_JAR=2020-11-25-11; ANID=AHWqTUk6jcSAcBdDtibQYiGTfQUGAuRhuYnyvgPcvYBz1purz90kvWBCko0uFkpk; SID=3wf937DNFxdlqxEgr2iht7C8yx1TeWe9-CP25OpCjpMXliqNNGAn7ONY1sT7MtRR8OMJ3g.; __Secure-3PSID=3wf937DNFxdlqxEgr2iht7C8yx1TeWe9-CP25OpCjpMXliqNPp-ovlWII4871YGDOIrxUw.; HSID=AkwEFKpRCHtNCRFqq; SSID=AKz0ZIUn_BI3Yavjc; APISID=RU_-eflXiUXoW7jQ/Akey2qQjr1e_A96JV; SAPISID=8xXeDxpAJxy0iM3P/ANjbfUZGlkQYdswz9; __Secure-3PAPISID=8xXeDxpAJxy0iM3P/ANjbfUZGlkQYdswz9; SIDCC=AJi4QfERVk3aUsEnvoDDHTY7EuJA7Fcju-hg3rC0dsmvg2yKwMOXztUpgX3TQBHemRKr3a2yDBLx; __Secure-3PSIDCC=AJi4QfFZKEgfjGF6c419NdGJINh92RagBiehTk8dcLHeL610DtWO-ClSGS4cCgPt_MpEkCPF8R67; OTZ=5707686_48_48_123900_44_436380; DV=w09DnlthQWtN8A5hulkyO4p2RurxX9e4HzHXyPBOlAIAAIC1D_9yn8G8_QAAAAgH7s-UDNE6VAAAAA
Host: www.google.com
Origin: https://www.google.com
Referer: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfnWuoZAAAAABI9TWbUYtaTr3HA8rZqJT3cJUj1&co=aHR0cDovL3d3dy5hdGhlbnNkZWVqYXkuZ3I6ODA.&hl=en&v=UFwvoDBMjc8LiYc1DKXiAomK&size=invisible&cb=zbjpc3tyeusv
TE: Trailers
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0
我的问题是,我想使用
wget
(意思是不按下按钮)从Ubuntu中的命令行复制相同的请求(按下按钮时发送)。我不知道如何找到查询URL中的
reToken
参数

我检查了按钮的源代码,发现在单击按钮时会执行此代码:

n => {
  var t = n.srcElement.dataset.instagirlid,
    i = n.srcElement.dataset.votingmonth;
  n.preventDefault();
  grecaptcha.ready(function() {
    grecaptcha.execute("6LfnWuoZAAAAABI9TWbUYtaTr3HA8rZqJT3cJUj1", {
      action: "instagirl"
    }).then(function(n) {
      voteItems(t, i, n)
    })
  })
}
因此,我假设这段代码首先通过某种ReCaptcha检查,然后发送请求。我检查了网络流量以验证这一点,在发送我的POST请求之前,确实有另一个对Google的POST请求:

https://www.google.com/recaptcha/api2/reload?k=6LfnWuoZAAAAABI9TWbUYtaTr3HA8rZqJT3cJUj1
使用请求头:

Accept: application/json, text/plain, */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Content-Length: 0
Cookie: votedMonths=|; userID=1298122909ba7bcc742; userIp=176.58.193.38;cookieconsent_status=dismiss
Host: www.[HOST_NAME].gr
Origin: http://www.[HOST_NAME].gr
Referer: http://www.[HOST_NAME].gr/[PATH]
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0
Accept: */*
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Content-Length: 5504
Content-Type: application/x-protobuffer
Cookie: NID=204=ofPxva7iaCaWlOaboW6MUpk3FESwgbLEmt1la7ayb5VWzDOmmFtoU8tJjtpiLzE00Xd7_3Q0mraUr-3yWMiSwSlt3RG9E3z-lDTvgrQ0OMvPO95MVvYxGlgbutVQb452diLLOzsHBcyMfMK4lTv6JN0ZX-MEf5WPcaifkZJlcMqF5k-P4BVgbeP6q0dPJ8kljzxl52dNsS1Z28OR_ssZz5AIvbB3AY7IlHQkpXDOZg; CONSENT=YES+GR.el+V12+BX; 1P_JAR=2020-11-25-11; ANID=AHWqTUk6jcSAcBdDtibQYiGTfQUGAuRhuYnyvgPcvYBz1purz90kvWBCko0uFkpk; SID=3wf937DNFxdlqxEgr2iht7C8yx1TeWe9-CP25OpCjpMXliqNNGAn7ONY1sT7MtRR8OMJ3g.; __Secure-3PSID=3wf937DNFxdlqxEgr2iht7C8yx1TeWe9-CP25OpCjpMXliqNPp-ovlWII4871YGDOIrxUw.; HSID=AkwEFKpRCHtNCRFqq; SSID=AKz0ZIUn_BI3Yavjc; APISID=RU_-eflXiUXoW7jQ/Akey2qQjr1e_A96JV; SAPISID=8xXeDxpAJxy0iM3P/ANjbfUZGlkQYdswz9; __Secure-3PAPISID=8xXeDxpAJxy0iM3P/ANjbfUZGlkQYdswz9; SIDCC=AJi4QfERVk3aUsEnvoDDHTY7EuJA7Fcju-hg3rC0dsmvg2yKwMOXztUpgX3TQBHemRKr3a2yDBLx; __Secure-3PSIDCC=AJi4QfFZKEgfjGF6c419NdGJINh92RagBiehTk8dcLHeL610DtWO-ClSGS4cCgPt_MpEkCPF8R67; OTZ=5707686_48_48_123900_44_436380; DV=w09DnlthQWtN8A5hulkyO4p2RurxX9e4HzHXyPBOlAIAAIC1D_9yn8G8_QAAAAgH7s-UDNE6VAAAAA
Host: www.google.com
Origin: https://www.google.com
Referer: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfnWuoZAAAAABI9TWbUYtaTr3HA8rZqJT3cJUj1&co=aHR0cDovL3d3dy5hdGhlbnNkZWVqYXkuZ3I6ODA.&hl=en&v=UFwvoDBMjc8LiYc1DKXiAomK&size=invisible&cb=zbjpc3tyeusv
TE: Trailers
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:83.0) Gecko/20100101 Firefox/83.0
和响应标题:

alt-svc: h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
cache-control: private, max-age=0
content-encoding: gzip
content-length: 7262
content-security-policy: frame-ancestors 'self'
content-type: application/json; charset=utf-8
date: Wed, 25 Nov 2020 11:20:12 GMT
expires: Wed, 25 Nov 2020 11:20:12 GMT
server: GSE
set-cookie: SIDCC=AJi4QfFVK6Q-bBdl3Vh_tWgTkL5ArwBkAf_TxXJShEdw7G3PMbFc9hZzxVI-vdZpRudKq-umbchA; expires=Thu, 25-Nov-2021 11:20:12 GMT; path=/; domain=.google.com; priority=high
set-cookie: __Secure-3PSIDCC=AJi4QfE1_oUJ0d4y1g3b_UcpC4UJ3AzcdDtEJUsgaof7uvitrg8Jsc-D3gr164tbl9qSrV602BUa; expires=Thu, 25-Nov-2021 11:20:12 GMT; path=/; domain=.google.com; Secure; HttpOnly; priority=high; SameSite=none
x-content-type-options: nosniff
X-Firefox-Spdy: h2
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
但是我没有看到在ReCaptcha请求之后从Google返回的任何令牌,因此我无法说明
reToken
是如何生成的,并在我想通过
wget
发送的POST请求中使用。有什么想法吗